R_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:48 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) 19:03:48 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 19:03:48 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:48 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, 0x0, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="056cdbc89a3cd18933438aae1a2c916821cedcf2f9cf49f6aa8dec50c91fad685d72b5e6647abeb1135cfc4bd45fb404d9ea2c5a470a7f647598d860421024c23f401349637d7885075748f5ae417a2609768239dcf4066440dce7d31070375eace8ab52c8c1a955523d6c6a8fe14b06675243e88779d782f498281e2f7b17f6f5042b11853ff0db3b9bc1bb7e9c7b9f80bf4d8f29ceb070ba97d624fdbef737e2ef1d92e3df02baccc8125231d5fde72f1b7e67879a2aebf5d80f973b24f63d6fc061e07a39a7e5f95a3cd78b6cab6a6c4b99face01e2785fdc16e08d9968bda32313a3861f4c47ef9a87068e0456949a18cb6853872524da7d877944e205aeaa7ee0726e5d009d13877395682b51216799791ee9bf441785aff63d4f62fd24e25396749b9ce105901810aeaed2b36d3acaa2e065bc6f74a4f5dda78b581c93cd0db827f4c58841e7c64d7e487e3df38af1dc1ad23685d5a609ffb751ee4bf7936e6de086cc32b6a2c221bf399d1a4006de92f6f1a2f927bf3e9c5ee6fe5d6f4589bc9010b2569eb57688bd4796ca3748f5e6c3cdd09ab0b981e8996e8780e7debe8c80a51118f473b8e61781ea90947979b5a981883a7966e34328b59dbb88b22aafb8e42889a075409c3e8a41d567a5aea7b470c80908b4677332b0ec6f863dfd3a8f0b5c13dd33b54789d0c6c410717bab988be7e056f05c0645a1e951e237f642303b84766c7ce17dd7d0f2928f31a92e81de9b4ac904f0a8243cbd799e6f80384348d817513bebd9d488e66b85ddd23dc3120ba55114c5470e8ca0e2a8b450c55e496dd3ebd3eee89aba9b42aa2ec3ed96ad9e9b23034a9fe95af647435f66b97756a3c0b91931b71ae3e2576cc56f6066afd0c2dc448e12eadfe60577b2bbc4f770b0540d84bc8970bd9b02365a72e4049a9017cc368ed6cacd6c590a775b3e4a404656a207017697dae8ad8a5d60f86975ab7559d15b8bf788b8493d7d25cc7e6b2add8db7d24ed20a01a322daf6133632bcab7e389d5fccbaa237cb6bd0c02df461a444a37522f1cf2c8cf0458b8d635dbcccce7409d94447c8fda7008f0d8f778ea1ad1e03af371a9ed081feb65ec9ca65706b448b79b9fbc72f01509389a9bb8580442341c73491e727e6ea097b07442b50772e52cc666df1a30fa8f175c4e35f5394ec9ccbd512e3357cc17fb819e56e91ae695b682d7cc04aec290f365cf3ad3caeab77df0815ac18aeddd884a2379abb45680f6e077de00739c05ce4fb0391d553f4543dc1bd92544042549c2ab4e024f802616315c9d92ed044129ad8c922d2fe92840c1f480b5fe3fc54761181c61cfdab07b8c88526df40f8cb407f35a762181bf21ac494a3f8501b101bbe2064529dcb533135d06770e9ac978624e8895a60f4c15ba76385d97fc052948efe8e115dc58b0f90784f136a"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:48 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, 0x0, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:48 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:48 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:48 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:48 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) 19:03:48 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) 19:03:48 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r3) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:48 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:48 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:48 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, 0x0, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:48 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, 0x0, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:48 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:48 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="056cdbc89a3cd18933438aae1a2c916821cedcf2f9cf49f6aa8dec50c91fad685d72b5e6647abeb1135cfc4bd45fb404d9ea2c5a470a7f647598d860421024c23f401349637d7885075748f5ae417a2609768239dcf4066440dce7d31070375eace8ab52c8c1a955523d6c6a8fe14b06675243e88779d782f498281e2f7b17f6f5042b11853ff0db3b9bc1bb7e9c7b9f80bf4d8f29ceb070ba97d624fdbef737e2ef1d92e3df02baccc8125231d5fde72f1b7e67879a2aebf5d80f973b24f63d6fc061e07a39a7e5f95a3cd78b6cab6a6c4b99face01e2785fdc16e08d9968bda32313a3861f4c47ef9a87068e0456949a18cb6853872524da7d877944e205aeaa7ee0726e5d009d13877395682b51216799791ee9bf441785aff63d4f62fd24e25396749b9ce105901810aeaed2b36d3acaa2e065bc6f74a4f5dda78b581c93cd0db827f4c58841e7c64d7e487e3df38af1dc1ad23685d5a609ffb751ee4bf7936e6de086cc32b6a2c221bf399d1a4006de92f6f1a2f927bf3e9c5ee6fe5d6f4589bc9010b2569eb57688bd4796ca3748f5e6c3cdd09ab0b981e8996e8780e7debe8c80a51118f473b8e61781ea90947979b5a981883a7966e34328b59dbb88b22aafb8e42889a075409c3e8a41d567a5aea7b470c80908b4677332b0ec6f863dfd3a8f0b5c13dd33b54789d0c6c410717bab988be7e056f05c0645a1e951e237f642303b84766c7ce17dd7d0f2928f31a92e81de9b4ac904f0a8243cbd799e6f80384348d817513bebd9d488e66b85ddd23dc3120ba55114c5470e8ca0e2a8b450c55e496dd3ebd3eee89aba9b42aa2ec3ed96ad9e9b23034a9fe95af647435f66b97756a3c0b91931b71ae3e2576cc56f6066afd0c2dc448e12eadfe60577b2bbc4f770b0540d84bc8970bd9b02365a72e4049a9017cc368ed6cacd6c590a775b3e4a404656a207017697dae8ad8a5d60f86975ab7559d15b8bf788b8493d7d25cc7e6b2add8db7d24ed20a01a322daf6133632bcab7e389d5fccbaa237cb6bd0c02df461a444a37522f1cf2c8cf0458b8d635dbcccce7409d94447c8fda7008f0d8f778ea1ad1e03af371a9ed081feb65ec9ca65706b448b79b9fbc72f01509389a9bb8580442341c73491e727e6ea097b07442b50772e52cc666df1a30fa8f175c4e35f5394ec9ccbd512e3357cc17fb819e56e91ae695b682d7cc04aec290f365cf3ad3caeab77df0815ac18aeddd884a2379abb45680f6e077de00739c05ce4fb0391d553f4543dc1bd92544042549c2ab4e024f802616315c9d92ed044129ad8c922d2fe92840c1f480b5fe3fc54761181c61cfdab07b8c88526df40f8cb407f35a762181bf21ac494a3f8501b101bbe2064529dcb533135d06770e9ac978624e8895a60f4c15ba76385d97fc052948efe8e115dc58b0f90784f136a"}) 19:03:49 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:49 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, 0x0, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:49 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, 0x0, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:49 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:49 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:49 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:49 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:49 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:49 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r3) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:49 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r3) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:49 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:49 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r3) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:49 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:49 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:49 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:49 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:49 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:49 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r3) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:50 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:50 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:50 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) 19:03:50 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:50 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:50 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:50 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) 19:03:50 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:50 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:50 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r2, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r3) 19:03:50 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r2, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) 19:03:50 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:50 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:50 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:50 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:50 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:50 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r2, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) 19:03:50 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:50 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) 19:03:50 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:50 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) 19:03:51 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:51 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:51 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:51 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) 19:03:51 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:51 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:51 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) 19:03:51 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:51 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:51 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:51 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) 19:03:51 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) 19:03:51 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) 19:03:51 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:51 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) 19:03:51 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:51 executing program 3: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) 19:03:51 executing program 3: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) 19:03:51 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x58, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:51 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:51 executing program 3: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) 19:03:51 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:51 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) 19:03:51 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) 19:03:51 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:51 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) 19:03:51 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) 19:03:51 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:52 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) 19:03:52 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:52 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x58, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:52 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:52 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:52 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) 19:03:52 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) 19:03:52 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:52 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="056cdbc89a3cd18933438aae1a2c916821cedcf2f9cf49f6aa8dec50c91fad685d72b5e6647abeb1135cfc4bd45fb404d9ea2c5a470a7f647598d860421024c23f401349637d7885075748f5ae417a2609768239dcf4066440dce7d31070375eace8ab52c8c1a955523d6c6a8fe14b06675243e88779d782f498281e2f7b17f6f5042b11853ff0db3b9bc1bb7e9c7b9f80bf4d8f29ceb070ba97d624fdbef737e2ef1d92e3df02baccc8125231d5fde72f1b7e67879a2aebf5d80f973b24f63d6fc061e07a39a7e5f95a3cd78b6cab6a6c4b99face01e2785fdc16e08d9968bda32313a3861f4c47ef9a87068e0456949a18cb6853872524da7d877944e205aeaa7ee0726e5d009d13877395682b51216799791ee9bf441785aff63d4f62fd24e25396749b9ce105901810aeaed2b36d3acaa2e065bc6f74a4f5dda78b581c93cd0db827f4c58841e7c64d7e487e3df38af1dc1ad23685d5a609ffb751ee4bf7936e6de086cc32b6a2c221bf399d1a4006de92f6f1a2f927bf3e9c5ee6fe5d6f4589bc9010b2569eb57688bd4796ca3748f5e6c3cdd09ab0b981e8996e8780e7debe8c80a51118f473b8e61781ea90947979b5a981883a7966e34328b59dbb88b22aafb8e42889a075409c3e8a41d567a5aea7b470c80908b4677332b0ec6f863dfd3a8f0b5c13dd33b54789d0c6c410717bab988be7e056f05c0645a1e951e237f642303b84766c7ce17dd7d0f2928f31a92e81de9b4ac904f0a8243cbd799e6f80384348d817513bebd9d488e66b85ddd23dc3120ba55114c5470e8ca0e2a8b450c55e496dd3ebd3eee89aba9b42aa2ec3ed96ad9e9b23034a9fe95af647435f66b97756a3c0b91931b71ae3e2576cc56f6066afd0c2dc448e12eadfe60577b2bbc4f770b0540d84bc8970bd9b02365a72e4049a9017cc368ed6cacd6c590a775b3e4a404656a207017697dae8ad8a5d60f86975ab7559d15b8bf788b8493d7d25cc7e6b2add8db7d24ed20a01a322daf6133632bcab7e389d5fccbaa237cb6bd0c02df461a444a37522f1cf2c8cf0458b8d635dbcccce7409d94447c8fda7008f0d8f778ea1ad1e03af371a9ed081feb65ec9ca65706b448b79b9fbc72f01509389a9bb8580442341c73491e727e6ea097b07442b50772e52cc666df1a30fa8f175c4e35f5394ec9ccbd512e3357cc17fb819e56e91ae695b682d7cc04aec290f365cf3ad3caeab77df0815ac18aeddd884a2379abb45680f6e077de00739c05ce4fb0391d553f4543dc1bd92544042549c2ab4e024f802616315c9d92ed044129ad8c922d2fe92840c1f480b5fe3fc54761181c61cfdab07b8c88526df40f8cb407f35a762181bf21ac494a3f8501b101bbe2064529dcb533135d06770e9ac978624e8895a60f4c15ba76385d97fc052948efe8e115dc58b0f90784f136a"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:52 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) 19:03:52 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:52 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 19:03:52 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x58, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:52 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:52 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:52 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) 19:03:52 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:52 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="056cdbc89a3cd18933438aae1a2c916821cedcf2f9cf49f6aa8dec50c91fad685d72b5e6647abeb1135cfc4bd45fb404d9ea2c5a470a7f647598d860421024c23f401349637d7885075748f5ae417a2609768239dcf4066440dce7d31070375eace8ab52c8c1a955523d6c6a8fe14b06675243e88779d782f498281e2f7b17f6f5042b11853ff0db3b9bc1bb7e9c7b9f80bf4d8f29ceb070ba97d624fdbef737e2ef1d92e3df02baccc8125231d5fde72f1b7e67879a2aebf5d80f973b24f63d6fc061e07a39a7e5f95a3cd78b6cab6a6c4b99face01e2785fdc16e08d9968bda32313a3861f4c47ef9a87068e0456949a18cb6853872524da7d877944e205aeaa7ee0726e5d009d13877395682b51216799791ee9bf441785aff63d4f62fd24e25396749b9ce105901810aeaed2b36d3acaa2e065bc6f74a4f5dda78b581c93cd0db827f4c58841e7c64d7e487e3df38af1dc1ad23685d5a609ffb751ee4bf7936e6de086cc32b6a2c221bf399d1a4006de92f6f1a2f927bf3e9c5ee6fe5d6f4589bc9010b2569eb57688bd4796ca3748f5e6c3cdd09ab0b981e8996e8780e7debe8c80a51118f473b8e61781ea90947979b5a981883a7966e34328b59dbb88b22aafb8e42889a075409c3e8a41d567a5aea7b470c80908b4677332b0ec6f863dfd3a8f0b5c13dd33b54789d0c6c410717bab988be7e056f05c0645a1e951e237f642303b84766c7ce17dd7d0f2928f31a92e81de9b4ac904f0a8243cbd799e6f80384348d817513bebd9d488e66b85ddd23dc3120ba55114c5470e8ca0e2a8b450c55e496dd3ebd3eee89aba9b42aa2ec3ed96ad9e9b23034a9fe95af647435f66b97756a3c0b91931b71ae3e2576cc56f6066afd0c2dc448e12eadfe60577b2bbc4f770b0540d84bc8970bd9b02365a72e4049a9017cc368ed6cacd6c590a775b3e4a404656a207017697dae8ad8a5d60f86975ab7559d15b8bf788b8493d7d25cc7e6b2add8db7d24ed20a01a322daf6133632bcab7e389d5fccbaa237cb6bd0c02df461a444a37522f1cf2c8cf0458b8d635dbcccce7409d94447c8fda7008f0d8f778ea1ad1e03af371a9ed081feb65ec9ca65706b448b79b9fbc72f01509389a9bb8580442341c73491e727e6ea097b07442b50772e52cc666df1a30fa8f175c4e35f5394ec9ccbd512e3357cc17fb819e56e91ae695b682d7cc04aec290f365cf3ad3caeab77df0815ac18aeddd884a2379abb45680f6e077de00739c05ce4fb0391d553f4543dc1bd92544042549c2ab4e024f802616315c9d92ed044129ad8c922d2fe92840c1f480b5fe3fc54761181c61cfdab07b8c88526df40f8cb407f35a762181bf21ac494a3f8501b101bbe2064529dcb533135d06770e9ac978624e8895a60f4c15ba76385d97fc052948efe8e115dc58b0f90784f136a"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:52 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:52 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:52 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) 19:03:52 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:53 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:53 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:53 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="056cdbc89a3cd18933438aae1a2c916821cedcf2f9cf49f6aa8dec50c91fad685d72b5e6647abeb1135cfc4bd45fb404d9ea2c5a470a7f647598d860421024c23f401349637d7885075748f5ae417a2609768239dcf4066440dce7d31070375eace8ab52c8c1a955523d6c6a8fe14b06675243e88779d782f498281e2f7b17f6f5042b11853ff0db3b9bc1bb7e9c7b9f80bf4d8f29ceb070ba97d624fdbef737e2ef1d92e3df02baccc8125231d5fde72f1b7e67879a2aebf5d80f973b24f63d6fc061e07a39a7e5f95a3cd78b6cab6a6c4b99face01e2785fdc16e08d9968bda32313a3861f4c47ef9a87068e0456949a18cb6853872524da7d877944e205aeaa7ee0726e5d009d13877395682b51216799791ee9bf441785aff63d4f62fd24e25396749b9ce105901810aeaed2b36d3acaa2e065bc6f74a4f5dda78b581c93cd0db827f4c58841e7c64d7e487e3df38af1dc1ad23685d5a609ffb751ee4bf7936e6de086cc32b6a2c221bf399d1a4006de92f6f1a2f927bf3e9c5ee6fe5d6f4589bc9010b2569eb57688bd4796ca3748f5e6c3cdd09ab0b981e8996e8780e7debe8c80a51118f473b8e61781ea90947979b5a981883a7966e34328b59dbb88b22aafb8e42889a075409c3e8a41d567a5aea7b470c80908b4677332b0ec6f863dfd3a8f0b5c13dd33b54789d0c6c410717bab988be7e056f05c0645a1e951e237f642303b84766c7ce17dd7d0f2928f31a92e81de9b4ac904f0a8243cbd799e6f80384348d817513bebd9d488e66b85ddd23dc3120ba55114c5470e8ca0e2a8b450c55e496dd3ebd3eee89aba9b42aa2ec3ed96ad9e9b23034a9fe95af647435f66b97756a3c0b91931b71ae3e2576cc56f6066afd0c2dc448e12eadfe60577b2bbc4f770b0540d84bc8970bd9b02365a72e4049a9017cc368ed6cacd6c590a775b3e4a404656a207017697dae8ad8a5d60f86975ab7559d15b8bf788b8493d7d25cc7e6b2add8db7d24ed20a01a322daf6133632bcab7e389d5fccbaa237cb6bd0c02df461a444a37522f1cf2c8cf0458b8d635dbcccce7409d94447c8fda7008f0d8f778ea1ad1e03af371a9ed081feb65ec9ca65706b448b79b9fbc72f01509389a9bb8580442341c73491e727e6ea097b07442b50772e52cc666df1a30fa8f175c4e35f5394ec9ccbd512e3357cc17fb819e56e91ae695b682d7cc04aec290f365cf3ad3caeab77df0815ac18aeddd884a2379abb45680f6e077de00739c05ce4fb0391d553f4543dc1bd92544042549c2ab4e024f802616315c9d92ed044129ad8c922d2fe92840c1f480b5fe3fc54761181c61cfdab07b8c88526df40f8cb407f35a762181bf21ac494a3f8501b101bbe2064529dcb533135d06770e9ac978624e8895a60f4c15ba76385d97fc052948efe8e115dc58b0f90784f136a"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:53 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:53 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:53 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:53 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:53 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:53 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:53 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:53 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:53 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x58, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:53 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:53 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:53 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:53 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:53 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:53 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x58, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) [ 255.397412][ T1236] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.403759][ T1236] ieee802154 phy1 wpan1: encryption failed: -22 19:03:53 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:54 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) 19:03:54 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) 19:03:54 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:54 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) 19:03:54 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:54 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x58, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:54 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x58, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:54 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:54 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x58, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:54 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:54 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="056cdbc89a3cd18933438aae1a2c916821cedcf2f9cf49f6aa8dec50c91fad685d72b5e6647abeb1135cfc4bd45fb404d9ea2c5a470a7f647598d860421024c23f401349637d7885075748f5ae417a2609768239dcf4066440dce7d31070375eace8ab52c8c1a955523d6c6a8fe14b06675243e88779d782f498281e2f7b17f6f5042b11853ff0db3b9bc1bb7e9c7b9f80bf4d8f29ceb070ba97d624fdbef737e2ef1d92e3df02baccc8125231d5fde72f1b7e67879a2aebf5d80f973b24f63d6fc061e07a39a7e5f95a3cd78b6cab6a6c4b99face01e2785fdc16e08d9968bda32313a3861f4c47ef9a87068e0456949a18cb6853872524da7d877944e205aeaa7ee0726e5d009d13877395682b51216799791ee9bf441785aff63d4f62fd24e25396749b9ce105901810aeaed2b36d3acaa2e065bc6f74a4f5dda78b581c93cd0db827f4c58841e7c64d7e487e3df38af1dc1ad23685d5a609ffb751ee4bf7936e6de086cc32b6a2c221bf399d1a4006de92f6f1a2f927bf3e9c5ee6fe5d6f4589bc9010b2569eb57688bd4796ca3748f5e6c3cdd09ab0b981e8996e8780e7debe8c80a51118f473b8e61781ea90947979b5a981883a7966e34328b59dbb88b22aafb8e42889a075409c3e8a41d567a5aea7b470c80908b4677332b0ec6f863dfd3a8f0b5c13dd33b54789d0c6c410717bab988be7e056f05c0645a1e951e237f642303b84766c7ce17dd7d0f2928f31a92e81de9b4ac904f0a8243cbd799e6f80384348d817513bebd9d488e66b85ddd23dc3120ba55114c5470e8ca0e2a8b450c55e496dd3ebd3eee89aba9b42aa2ec3ed96ad9e9b23034a9fe95af647435f66b97756a3c0b91931b71ae3e2576cc56f6066afd0c2dc448e12eadfe60577b2bbc4f770b0540d84bc8970bd9b02365a72e4049a9017cc368ed6cacd6c590a775b3e4a404656a207017697dae8ad8a5d60f86975ab7559d15b8bf788b8493d7d25cc7e6b2add8db7d24ed20a01a322daf6133632bcab7e389d5fccbaa237cb6bd0c02df461a444a37522f1cf2c8cf0458b8d635dbcccce7409d94447c8fda7008f0d8f778ea1ad1e03af371a9ed081feb65ec9ca65706b448b79b9fbc72f01509389a9bb8580442341c73491e727e6ea097b07442b50772e52cc666df1a30fa8f175c4e35f5394ec9ccbd512e3357cc17fb819e56e91ae695b682d7cc04aec290f365cf3ad3caeab77df0815ac18aeddd884a2379abb45680f6e077de00739c05ce4fb0391d553f4543dc1bd92544042549c2ab4e024f802616315c9d92ed044129ad8c922d2fe92840c1f480b5fe3fc54761181c61cfdab07b8c88526df40f8cb407f35a762181bf21ac494a3f8501b101bbe2064529dcb533135d06770e9ac978624e8895a60f4c15ba76385d97fc052948efe8e115dc58b0f90784f136a"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:54 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:54 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:54 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:54 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x58, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:54 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:54 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:55 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:55 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:55 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:55 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x58, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:55 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:55 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:55 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:55 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:55 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x4c, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:55 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:55 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x58, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:55 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:55 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) 19:03:55 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:55 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x4c, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:55 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:55 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:55 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:55 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:56 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:56 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x4c, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:56 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:56 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:56 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:56 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:56 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x58, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:56 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:56 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) 19:03:56 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:56 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) 19:03:56 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x58, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:56 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:56 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:56 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x58, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:56 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="056cdbc89a3cd18933438aae1a2c916821cedcf2f9cf49f6aa8dec50c91fad685d72b5e6647abeb1135cfc4bd45fb404d9ea2c5a470a7f647598d860421024c23f401349637d7885075748f5ae417a2609768239dcf4066440dce7d31070375eace8ab52c8c1a955523d6c6a8fe14b06675243e88779d782f498281e2f7b17f6f5042b11853ff0db3b9bc1bb7e9c7b9f80bf4d8f29ceb070ba97d624fdbef737e2ef1d92e3df02baccc8125231d5fde72f1b7e67879a2aebf5d80f973b24f63d6fc061e07a39a7e5f95a3cd78b6cab6a6c4b99face01e2785fdc16e08d9968bda32313a3861f4c47ef9a87068e0456949a18cb6853872524da7d877944e205aeaa7ee0726e5d009d13877395682b51216799791ee9bf441785aff63d4f62fd24e25396749b9ce105901810aeaed2b36d3acaa2e065bc6f74a4f5dda78b581c93cd0db827f4c58841e7c64d7e487e3df38af1dc1ad23685d5a609ffb751ee4bf7936e6de086cc32b6a2c221bf399d1a4006de92f6f1a2f927bf3e9c5ee6fe5d6f4589bc9010b2569eb57688bd4796ca3748f5e6c3cdd09ab0b981e8996e8780e7debe8c80a51118f473b8e61781ea90947979b5a981883a7966e34328b59dbb88b22aafb8e42889a075409c3e8a41d567a5aea7b470c80908b4677332b0ec6f863dfd3a8f0b5c13dd33b54789d0c6c410717bab988be7e056f05c0645a1e951e237f642303b84766c7ce17dd7d0f2928f31a92e81de9b4ac904f0a8243cbd799e6f80384348d817513bebd9d488e66b85ddd23dc3120ba55114c5470e8ca0e2a8b450c55e496dd3ebd3eee89aba9b42aa2ec3ed96ad9e9b23034a9fe95af647435f66b97756a3c0b91931b71ae3e2576cc56f6066afd0c2dc448e12eadfe60577b2bbc4f770b0540d84bc8970bd9b02365a72e4049a9017cc368ed6cacd6c590a775b3e4a404656a207017697dae8ad8a5d60f86975ab7559d15b8bf788b8493d7d25cc7e6b2add8db7d24ed20a01a322daf6133632bcab7e389d5fccbaa237cb6bd0c02df461a444a37522f1cf2c8cf0458b8d635dbcccce7409d94447c8fda7008f0d8f778ea1ad1e03af371a9ed081feb65ec9ca65706b448b79b9fbc72f01509389a9bb8580442341c73491e727e6ea097b07442b50772e52cc666df1a30fa8f175c4e35f5394ec9ccbd512e3357cc17fb819e56e91ae695b682d7cc04aec290f365cf3ad3caeab77df0815ac18aeddd884a2379abb45680f6e077de00739c05ce4fb0391d553f4543dc1bd92544042549c2ab4e024f802616315c9d92ed044129ad8c922d2fe92840c1f480b5fe3fc54761181c61cfdab07b8c88526df40f8cb407f35a762181bf21ac494a3f8501b101bbe2064529dcb533135d06770e9ac978624e8895a60f4c15ba76385d97fc052948efe8e115dc58b0f90784f136a"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:56 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:56 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:56 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) 19:03:56 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) 19:03:57 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:57 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:57 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 19:03:57 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:57 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:57 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:57 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:57 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:57 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x1101, 0x0) 19:03:57 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:57 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:57 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:57 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:57 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:57 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="056cdbc89a3cd18933438aae1a2c916821cedcf2f9cf49f6aa8dec50c91fad685d72b5e6647abeb1135cfc4bd45fb404d9ea2c5a470a7f647598d860421024c23f401349637d7885075748f5ae417a2609768239dcf4066440dce7d31070375eace8ab52c8c1a955523d6c6a8fe14b06675243e88779d782f498281e2f7b17f6f5042b11853ff0db3b9bc1bb7e9c7b9f80bf4d8f29ceb070ba97d624fdbef737e2ef1d92e3df02baccc8125231d5fde72f1b7e67879a2aebf5d80f973b24f63d6fc061e07a39a7e5f95a3cd78b6cab6a6c4b99face01e2785fdc16e08d9968bda32313a3861f4c47ef9a87068e0456949a18cb6853872524da7d877944e205aeaa7ee0726e5d009d13877395682b51216799791ee9bf441785aff63d4f62fd24e25396749b9ce105901810aeaed2b36d3acaa2e065bc6f74a4f5dda78b581c93cd0db827f4c58841e7c64d7e487e3df38af1dc1ad23685d5a609ffb751ee4bf7936e6de086cc32b6a2c221bf399d1a4006de92f6f1a2f927bf3e9c5ee6fe5d6f4589bc9010b2569eb57688bd4796ca3748f5e6c3cdd09ab0b981e8996e8780e7debe8c80a51118f473b8e61781ea90947979b5a981883a7966e34328b59dbb88b22aafb8e42889a075409c3e8a41d567a5aea7b470c80908b4677332b0ec6f863dfd3a8f0b5c13dd33b54789d0c6c410717bab988be7e056f05c0645a1e951e237f642303b84766c7ce17dd7d0f2928f31a92e81de9b4ac904f0a8243cbd799e6f80384348d817513bebd9d488e66b85ddd23dc3120ba55114c5470e8ca0e2a8b450c55e496dd3ebd3eee89aba9b42aa2ec3ed96ad9e9b23034a9fe95af647435f66b97756a3c0b91931b71ae3e2576cc56f6066afd0c2dc448e12eadfe60577b2bbc4f770b0540d84bc8970bd9b02365a72e4049a9017cc368ed6cacd6c590a775b3e4a404656a207017697dae8ad8a5d60f86975ab7559d15b8bf788b8493d7d25cc7e6b2add8db7d24ed20a01a322daf6133632bcab7e389d5fccbaa237cb6bd0c02df461a444a37522f1cf2c8cf0458b8d635dbcccce7409d94447c8fda7008f0d8f778ea1ad1e03af371a9ed081feb65ec9ca65706b448b79b9fbc72f01509389a9bb8580442341c73491e727e6ea097b07442b50772e52cc666df1a30fa8f175c4e35f5394ec9ccbd512e3357cc17fb819e56e91ae695b682d7cc04aec290f365cf3ad3caeab77df0815ac18aeddd884a2379abb45680f6e077de00739c05ce4fb0391d553f4543dc1bd92544042549c2ab4e024f802616315c9d92ed044129ad8c922d2fe92840c1f480b5fe3fc54761181c61cfdab07b8c88526df40f8cb407f35a762181bf21ac494a3f8501b101bbe2064529dcb533135d06770e9ac978624e8895a60f4c15ba76385d97fc052948efe8e115dc58b0f90784f136a"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:57 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:57 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:57 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:57 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f0000000400)=""/4096) 19:03:58 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:58 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="056cdbc89a3cd18933438aae1a2c916821cedcf2f9cf49f6aa8dec50c91fad685d72b5e6647abeb1135cfc4bd45fb404d9ea2c5a470a7f647598d860421024c23f401349637d7885075748f5ae417a2609768239dcf4066440dce7d31070375eace8ab52c8c1a955523d6c6a8fe14b06675243e88779d782f498281e2f7b17f6f5042b11853ff0db3b9bc1bb7e9c7b9f80bf4d8f29ceb070ba97d624fdbef737e2ef1d92e3df02baccc8125231d5fde72f1b7e67879a2aebf5d80f973b24f63d6fc061e07a39a7e5f95a3cd78b6cab6a6c4b99face01e2785fdc16e08d9968bda32313a3861f4c47ef9a87068e0456949a18cb6853872524da7d877944e205aeaa7ee0726e5d009d13877395682b51216799791ee9bf441785aff63d4f62fd24e25396749b9ce105901810aeaed2b36d3acaa2e065bc6f74a4f5dda78b581c93cd0db827f4c58841e7c64d7e487e3df38af1dc1ad23685d5a609ffb751ee4bf7936e6de086cc32b6a2c221bf399d1a4006de92f6f1a2f927bf3e9c5ee6fe5d6f4589bc9010b2569eb57688bd4796ca3748f5e6c3cdd09ab0b981e8996e8780e7debe8c80a51118f473b8e61781ea90947979b5a981883a7966e34328b59dbb88b22aafb8e42889a075409c3e8a41d567a5aea7b470c80908b4677332b0ec6f863dfd3a8f0b5c13dd33b54789d0c6c410717bab988be7e056f05c0645a1e951e237f642303b84766c7ce17dd7d0f2928f31a92e81de9b4ac904f0a8243cbd799e6f80384348d817513bebd9d488e66b85ddd23dc3120ba55114c5470e8ca0e2a8b450c55e496dd3ebd3eee89aba9b42aa2ec3ed96ad9e9b23034a9fe95af647435f66b97756a3c0b91931b71ae3e2576cc56f6066afd0c2dc448e12eadfe60577b2bbc4f770b0540d84bc8970bd9b02365a72e4049a9017cc368ed6cacd6c590a775b3e4a404656a207017697dae8ad8a5d60f86975ab7559d15b8bf788b8493d7d25cc7e6b2add8db7d24ed20a01a322daf6133632bcab7e389d5fccbaa237cb6bd0c02df461a444a37522f1cf2c8cf0458b8d635dbcccce7409d94447c8fda7008f0d8f778ea1ad1e03af371a9ed081feb65ec9ca65706b448b79b9fbc72f01509389a9bb8580442341c73491e727e6ea097b07442b50772e52cc666df1a30fa8f175c4e35f5394ec9ccbd512e3357cc17fb819e56e91ae695b682d7cc04aec290f365cf3ad3caeab77df0815ac18aeddd884a2379abb45680f6e077de00739c05ce4fb0391d553f4543dc1bd92544042549c2ab4e024f802616315c9d92ed044129ad8c922d2fe92840c1f480b5fe3fc54761181c61cfdab07b8c88526df40f8cb407f35a762181bf21ac494a3f8501b101bbe2064529dcb533135d06770e9ac978624e8895a60f4c15ba76385d97fc052948efe8e115dc58b0f90784f136a"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:58 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:58 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) 19:03:58 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 19:03:58 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:58 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) 19:03:58 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 19:03:58 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) 19:03:58 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:58 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:58 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 19:03:58 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:58 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:58 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 19:03:58 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) 19:03:58 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 19:03:58 executing program 0: syz_open_dev$I2C(0x0, 0x0, 0x8000) ioctl$I2C_SLAVE(0xffffffffffffffff, 0x703, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) syz_open_dev$I2C(&(0x7f0000000480), 0x8000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 19:03:58 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) 19:03:58 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) 19:03:58 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:58 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:58 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="056cdbc89a3cd18933438aae1a2c916821cedcf2f9cf49f6aa8dec50c91fad685d72b5e6647abeb1135cfc4bd45fb404d9ea2c5a470a7f647598d860421024c23f401349637d7885075748f5ae417a2609768239dcf4066440dce7d31070375eace8ab52c8c1a955523d6c6a8fe14b06675243e88779d782f498281e2f7b17f6f5042b11853ff0db3b9bc1bb7e9c7b9f80bf4d8f29ceb070ba97d624fdbef737e2ef1d92e3df02baccc8125231d5fde72f1b7e67879a2aebf5d80f973b24f63d6fc061e07a39a7e5f95a3cd78b6cab6a6c4b99face01e2785fdc16e08d9968bda32313a3861f4c47ef9a87068e0456949a18cb6853872524da7d877944e205aeaa7ee0726e5d009d13877395682b51216799791ee9bf441785aff63d4f62fd24e25396749b9ce105901810aeaed2b36d3acaa2e065bc6f74a4f5dda78b581c93cd0db827f4c58841e7c64d7e487e3df38af1dc1ad23685d5a609ffb751ee4bf7936e6de086cc32b6a2c221bf399d1a4006de92f6f1a2f927bf3e9c5ee6fe5d6f4589bc9010b2569eb57688bd4796ca3748f5e6c3cdd09ab0b981e8996e8780e7debe8c80a51118f473b8e61781ea90947979b5a981883a7966e34328b59dbb88b22aafb8e42889a075409c3e8a41d567a5aea7b470c80908b4677332b0ec6f863dfd3a8f0b5c13dd33b54789d0c6c410717bab988be7e056f05c0645a1e951e237f642303b84766c7ce17dd7d0f2928f31a92e81de9b4ac904f0a8243cbd799e6f80384348d817513bebd9d488e66b85ddd23dc3120ba55114c5470e8ca0e2a8b450c55e496dd3ebd3eee89aba9b42aa2ec3ed96ad9e9b23034a9fe95af647435f66b97756a3c0b91931b71ae3e2576cc56f6066afd0c2dc448e12eadfe60577b2bbc4f770b0540d84bc8970bd9b02365a72e4049a9017cc368ed6cacd6c590a775b3e4a404656a207017697dae8ad8a5d60f86975ab7559d15b8bf788b8493d7d25cc7e6b2add8db7d24ed20a01a322daf6133632bcab7e389d5fccbaa237cb6bd0c02df461a444a37522f1cf2c8cf0458b8d635dbcccce7409d94447c8fda7008f0d8f778ea1ad1e03af371a9ed081feb65ec9ca65706b448b79b9fbc72f01509389a9bb8580442341c73491e727e6ea097b07442b50772e52cc666df1a30fa8f175c4e35f5394ec9ccbd512e3357cc17fb819e56e91ae695b682d7cc04aec290f365cf3ad3caeab77df0815ac18aeddd884a2379abb45680f6e077de00739c05ce4fb0391d553f4543dc1bd92544042549c2ab4e024f802616315c9d92ed044129ad8c922d2fe92840c1f480b5fe3fc54761181c61cfdab07b8c88526df40f8cb407f35a762181bf21ac494a3f8501b101bbe2064529dcb533135d06770e9ac978624e8895a60f4c15ba76385d97fc052948efe8e115dc58b0f90784f136a"}) 19:03:58 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 19:03:58 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) 19:03:58 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) 19:03:58 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) 19:03:58 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:58 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 19:03:58 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) 19:03:59 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) 19:03:59 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) 19:03:59 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) 19:03:59 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 19:03:59 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:59 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:59 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) 19:03:59 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) 19:03:59 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) 19:03:59 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 19:03:59 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:59 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:03:59 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) 19:03:59 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) 19:03:59 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000001a00)=""/216) 19:04:00 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:00 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 19:04:00 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000001a00)=""/216) 19:04:00 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="056cdbc89a3cd18933438aae1a2c916821cedcf2f9cf49f6aa8dec50c91fad685d72b5e6647abeb1135cfc4bd45fb404d9ea2c5a470a7f647598d860421024c23f401349637d7885075748f5ae417a2609768239dcf4066440dce7d31070375eace8ab52c8c1a955523d6c6a8fe14b06675243e88779d782f498281e2f7b17f6f5042b11853ff0db3b9bc1bb7e9c7b9f80bf4d8f29ceb070ba97d624fdbef737e2ef1d92e3df02baccc8125231d5fde72f1b7e67879a2aebf5d80f973b24f63d6fc061e07a39a7e5f95a3cd78b6cab6a6c4b99face01e2785fdc16e08d9968bda32313a3861f4c47ef9a87068e0456949a18cb6853872524da7d877944e205aeaa7ee0726e5d009d13877395682b51216799791ee9bf441785aff63d4f62fd24e25396749b9ce105901810aeaed2b36d3acaa2e065bc6f74a4f5dda78b581c93cd0db827f4c58841e7c64d7e487e3df38af1dc1ad23685d5a609ffb751ee4bf7936e6de086cc32b6a2c221bf399d1a4006de92f6f1a2f927bf3e9c5ee6fe5d6f4589bc9010b2569eb57688bd4796ca3748f5e6c3cdd09ab0b981e8996e8780e7debe8c80a51118f473b8e61781ea90947979b5a981883a7966e34328b59dbb88b22aafb8e42889a075409c3e8a41d567a5aea7b470c80908b4677332b0ec6f863dfd3a8f0b5c13dd33b54789d0c6c410717bab988be7e056f05c0645a1e951e237f642303b84766c7ce17dd7d0f2928f31a92e81de9b4ac904f0a8243cbd799e6f80384348d817513bebd9d488e66b85ddd23dc3120ba55114c5470e8ca0e2a8b450c55e496dd3ebd3eee89aba9b42aa2ec3ed96ad9e9b23034a9fe95af647435f66b97756a3c0b91931b71ae3e2576cc56f6066afd0c2dc448e12eadfe60577b2bbc4f770b0540d84bc8970bd9b02365a72e4049a9017cc368ed6cacd6c590a775b3e4a404656a207017697dae8ad8a5d60f86975ab7559d15b8bf788b8493d7d25cc7e6b2add8db7d24ed20a01a322daf6133632bcab7e389d5fccbaa237cb6bd0c02df461a444a37522f1cf2c8cf0458b8d635dbcccce7409d94447c8fda7008f0d8f778ea1ad1e03af371a9ed081feb65ec9ca65706b448b79b9fbc72f01509389a9bb8580442341c73491e727e6ea097b07442b50772e52cc666df1a30fa8f175c4e35f5394ec9ccbd512e3357cc17fb819e56e91ae695b682d7cc04aec290f365cf3ad3caeab77df0815ac18aeddd884a2379abb45680f6e077de00739c05ce4fb0391d553f4543dc1bd92544042549c2ab4e024f802616315c9d92ed044129ad8c922d2fe92840c1f480b5fe3fc54761181c61cfdab07b8c88526df40f8cb407f35a762181bf21ac494a3f8501b101bbe2064529dcb533135d06770e9ac978624e8895a60f4c15ba76385d97fc052948efe8e115dc58b0f90784f136a"}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000001a00)=""/216) 19:04:00 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) 19:04:00 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) 19:04:00 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:00 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 19:04:00 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:00 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:00 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000001a00)=""/216) 19:04:00 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:00 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000001a00)=""/216) 19:04:00 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000001a00)=""/216) 19:04:01 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000001a00)=""/216) 19:04:01 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 19:04:01 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:01 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000001a00)=""/216) 19:04:01 executing program 3: syz_open_dev$I2C(0x0, 0x0, 0x8000) ioctl$I2C_SLAVE(0xffffffffffffffff, 0x703, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x60000) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) syz_open_dev$I2C(&(0x7f0000000480), 0x8000, 0x2800c0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000500), 0xffffffffffffffff) 19:04:01 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:01 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000001a00)=""/216) 19:04:01 executing program 2: syz_open_dev$I2C(0x0, 0x0, 0x8000) ioctl$I2C_SLAVE(0xffffffffffffffff, 0x703, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@getnexthop={0x18, 0x6a, 0x8, 0x70bd28, 0x25dfdbfd}, 0x18}, 0x1, 0x0, 0x0, 0x20084810}, 0x60000) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) syz_open_dev$I2C(&(0x7f0000000480), 0x8000, 0x2800c0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000500), 0xffffffffffffffff) 19:04:01 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:01 executing program 2: syz_open_dev$I2C(0x0, 0x0, 0x8000) ioctl$I2C_SLAVE(0xffffffffffffffff, 0x703, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, 0x0, 0x48802) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@getnexthop={0x18, 0x6a, 0x8, 0x70bd28, 0x25dfdbfd}, 0x18}, 0x1, 0x0, 0x0, 0x20084810}, 0x60000) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) syz_open_dev$I2C(&(0x7f0000000480), 0x8000, 0x2800c0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000500), 0xffffffffffffffff) 19:04:01 executing program 3: syz_open_dev$I2C(0x0, 0x0, 0x8000) ioctl$I2C_SLAVE(0xffffffffffffffff, 0x703, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x9}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_PW_TYPE={0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x4010}, 0x48802) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@getnexthop={0x18, 0x6a, 0x8, 0x70bd28, 0x25dfdbfd}, 0x18}, 0x1, 0x0, 0x0, 0x20084810}, 0x60000) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) syz_open_dev$I2C(&(0x7f0000000480), 0x8000, 0x2800c0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000500), 0xffffffffffffffff) 19:04:01 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000001a00)=""/216) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:01 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}]}, 0x22) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xdedc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x68, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000001540)=0x3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000001980)={0x6b, 0x1b, &(0x7f0000001580)="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"}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000019c0), 0x7c1e98691d68d23, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000001a00)=""/216) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:01 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 19:04:01 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x40, 0x8000, 0x1, 0xfffffffe, {{0x29, 0x4, 0x3, 0x7, 0xa4, 0x66, 0x0, 0x0, 0x2b, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0xb, 0x8c, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x23}]}, @generic={0x7, 0x9, "d94e85aeac6d34"}, @cipso={0x86, 0x16, 0x3, [{0x1, 0x10, "55d7cb9ced400274470ae51a1af8"}]}, @lsrr={0x83, 0x17, 0xac, [@private=0xa010101, @remote, @loopback, @loopback, @empty]}, @lsrr={0x83, 0x2b, 0xb8, [@remote, @empty, @multicast2, @empty, @multicast2, @multicast1, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @generic={0x86, 0x6, "17f032c3"}, @lsrr={0x83, 0x7, 0xc, [@multicast2]}, @lsrr={0x83, 0x13, 0x28, [@dev={0xac, 0x14, 0x14, 0x2f}, @local, @empty, @broadcast]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000800)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000840)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000bc0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000940)={0x208, r6, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x4004000}, 0x8000) 19:04:01 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x40, 0x8000, 0x1, 0xfffffffe, {{0x29, 0x4, 0x3, 0x7, 0xa4, 0x66, 0x0, 0x0, 0x2b, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0xb, 0x8c, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x23}]}, @generic={0x7, 0x9, "d94e85aeac6d34"}, @cipso={0x86, 0x16, 0x3, [{0x1, 0x10, "55d7cb9ced400274470ae51a1af8"}]}, @lsrr={0x83, 0x17, 0xac, [@private=0xa010101, @remote, @loopback, @loopback, @empty]}, @lsrr={0x83, 0x2b, 0xb8, [@remote, @empty, @multicast2, @empty, @multicast2, @multicast1, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @generic={0x86, 0x6, "17f032c3"}, @lsrr={0x83, 0x7, 0xc, [@multicast2]}, @lsrr={0x83, 0x13, 0x28, [@dev={0xac, 0x14, 0x14, 0x2f}, @local, @empty, @broadcast]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000800)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000840)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000bc0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000940)={0x208, r6, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x4004000}, 0x8000) 19:04:01 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "6a596533ff98e125548310fbc101b63479877d29a74791463d8edb174a73082f1f87d2138d4c07a17e24d7b5f859a931dc2c696e2adcecf9adf76e4363d1228a6542c6fb18d7964c5bb2d8474cc7cc1235a25b500dfcad3c2aaf5bd63f6ded2ab76d20fbd5a1cea226a346d769dd8ae0b5359738b45537b85077143a1f12de0f7c7f9c5a247f5b4a870534670b5fd10e81ac760c62aadebf8bfcd0a92913c1443da4dd1d0b1f1d228782dd240d9e14c23c34485c33521292dfce969f2e2a086c1d749e990596739db5eeb3fe5c3bf37c61359d59380946fc260b520dabd94ca5c5e446c75c78454885953b3491c24a2e686c123bbf4cdb0c2991a66d5e9a0be289a66cb9684a490da5d69020a14e96922e5e8ce717cf982c2d0a99ad881e3d3e887cb4d94ddd87e4aa45e4feb6640c0f46310b6261e9faec740848ea735b825bfe2ecd928f67a5aa70287e333bfb12e2e01e085abea6fffb02755c88372cf791b51a77c9992ad0107646b8441b7205ce4488e66a07a2ce7c0caab34b0141f213e6e303497e1c2ff6350eda07430f9f64ad4a7dcff5416064f1bef290fd0896e830999ebca8c1f89a25a7bb0703fe3c3f9cdbcb797523f05d55c35a3a1a0bef7b94f308c856c04d1b19463378488510d08d2e9bba12270edf0637d94948352bbeb265f654aac2b7b3f52e275c9d4a320e6db21b5b84425ef7701cefeccd0ab9b7"}) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x40, 0x8000, 0x1, 0xfffffffe, {{0x29, 0x4, 0x3, 0x7, 0xa4, 0x66, 0x0, 0x0, 0x2b, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0xb, 0x8c, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x23}]}, @generic={0x7, 0x9, "d94e85aeac6d34"}, @cipso={0x86, 0x16, 0x3, [{0x1, 0x10, "55d7cb9ced400274470ae51a1af8"}]}, @lsrr={0x83, 0x17, 0xac, [@private=0xa010101, @remote, @loopback, @loopback, @empty]}, @lsrr={0x83, 0x2b, 0xb8, [@remote, @empty, @multicast2, @empty, @multicast2, @multicast1, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @generic={0x86, 0x6, "17f032c3"}, @lsrr={0x83, 0x7, 0xc, [@multicast2]}, @lsrr={0x83, 0x13, 0x28, [@dev={0xac, 0x14, 0x14, 0x2f}, @local, @empty, @broadcast]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000800)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000840)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000bc0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000940)={0x208, r6, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x4004000}, 0x8000) 19:04:01 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 19:04:01 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x40, 0x8000, 0x1, 0xfffffffe, {{0x29, 0x4, 0x3, 0x7, 0xa4, 0x66, 0x0, 0x0, 0x2b, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0xb, 0x8c, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x23}]}, @generic={0x7, 0x9, "d94e85aeac6d34"}, @cipso={0x86, 0x16, 0x3, [{0x1, 0x10, "55d7cb9ced400274470ae51a1af8"}]}, @lsrr={0x83, 0x17, 0xac, [@private=0xa010101, @remote, @loopback, @loopback, @empty]}, @lsrr={0x83, 0x2b, 0xb8, [@remote, @empty, @multicast2, @empty, @multicast2, @multicast1, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @generic={0x86, 0x6, "17f032c3"}, @lsrr={0x83, 0x7, 0xc, [@multicast2]}, @lsrr={0x83, 0x13, 0x28, [@dev={0xac, 0x14, 0x14, 0x2f}, @local, @empty, @broadcast]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000800)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000840)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000bc0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000940)={0x208, r6, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x4004000}, 0x8000) 19:04:01 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "6a596533ff98e125548310fbc101b63479877d29a74791463d8edb174a73082f1f87d2138d4c07a17e24d7b5f859a931dc2c696e2adcecf9adf76e4363d1228a6542c6fb18d7964c5bb2d8474cc7cc1235a25b500dfcad3c2aaf5bd63f6ded2ab76d20fbd5a1cea226a346d769dd8ae0b5359738b45537b85077143a1f12de0f7c7f9c5a247f5b4a870534670b5fd10e81ac760c62aadebf8bfcd0a92913c1443da4dd1d0b1f1d228782dd240d9e14c23c34485c33521292dfce969f2e2a086c1d749e990596739db5eeb3fe5c3bf37c61359d59380946fc260b520dabd94ca5c5e446c75c78454885953b3491c24a2e686c123bbf4cdb0c2991a66d5e9a0be289a66cb9684a490da5d69020a14e96922e5e8ce717cf982c2d0a99ad881e3d3e887cb4d94ddd87e4aa45e4feb6640c0f46310b6261e9faec740848ea735b825bfe2ecd928f67a5aa70287e333bfb12e2e01e085abea6fffb02755c88372cf791b51a77c9992ad0107646b8441b7205ce4488e66a07a2ce7c0caab34b0141f213e6e303497e1c2ff6350eda07430f9f64ad4a7dcff5416064f1bef290fd0896e830999ebca8c1f89a25a7bb0703fe3c3f9cdbcb797523f05d55c35a3a1a0bef7b94f308c856c04d1b19463378488510d08d2e9bba12270edf0637d94948352bbeb265f654aac2b7b3f52e275c9d4a320e6db21b5b84425ef7701cefeccd0ab9b7"}) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x40, 0x8000, 0x1, 0xfffffffe, {{0x29, 0x4, 0x3, 0x7, 0xa4, 0x66, 0x0, 0x0, 0x2b, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0xb, 0x8c, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x23}]}, @generic={0x7, 0x9, "d94e85aeac6d34"}, @cipso={0x86, 0x16, 0x3, [{0x1, 0x10, "55d7cb9ced400274470ae51a1af8"}]}, @lsrr={0x83, 0x17, 0xac, [@private=0xa010101, @remote, @loopback, @loopback, @empty]}, @lsrr={0x83, 0x2b, 0xb8, [@remote, @empty, @multicast2, @empty, @multicast2, @multicast1, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @generic={0x86, 0x6, "17f032c3"}, @lsrr={0x83, 0x7, 0xc, [@multicast2]}, @lsrr={0x83, 0x13, 0x28, [@dev={0xac, 0x14, 0x14, 0x2f}, @local, @empty, @broadcast]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000800)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000840)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000bc0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000940)={0x208, r6, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x4004000}, 0x8000) 19:04:01 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) (fail_nth: 1) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:01 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) (fail_nth: 1) 19:04:01 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x40, 0x8000, 0x1, 0xfffffffe, {{0x29, 0x4, 0x3, 0x7, 0xa4, 0x66, 0x0, 0x0, 0x2b, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0xb, 0x8c, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x23}]}, @generic={0x7, 0x9, "d94e85aeac6d34"}, @cipso={0x86, 0x16, 0x3, [{0x1, 0x10, "55d7cb9ced400274470ae51a1af8"}]}, @lsrr={0x83, 0x17, 0xac, [@private=0xa010101, @remote, @loopback, @loopback, @empty]}, @lsrr={0x83, 0x2b, 0xb8, [@remote, @empty, @multicast2, @empty, @multicast2, @multicast1, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @generic={0x86, 0x6, "17f032c3"}, @lsrr={0x83, 0x7, 0xc, [@multicast2]}, @lsrr={0x83, 0x13, 0x28, [@dev={0xac, 0x14, 0x14, 0x2f}, @local, @empty, @broadcast]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000800)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000840)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000bc0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000940)={0x208, r6, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x4004000}, 0x8000) 19:04:01 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x40, 0x8000, 0x1, 0xfffffffe, {{0x29, 0x4, 0x3, 0x7, 0xa4, 0x66, 0x0, 0x0, 0x2b, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0xb, 0x8c, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x23}]}, @generic={0x7, 0x9, "d94e85aeac6d34"}, @cipso={0x86, 0x16, 0x3, [{0x1, 0x10, "55d7cb9ced400274470ae51a1af8"}]}, @lsrr={0x83, 0x17, 0xac, [@private=0xa010101, @remote, @loopback, @loopback, @empty]}, @lsrr={0x83, 0x2b, 0xb8, [@remote, @empty, @multicast2, @empty, @multicast2, @multicast1, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @generic={0x86, 0x6, "17f032c3"}, @lsrr={0x83, 0x7, 0xc, [@multicast2]}, @lsrr={0x83, 0x13, 0x28, [@dev={0xac, 0x14, 0x14, 0x2f}, @local, @empty, @broadcast]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000800)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000840)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000bc0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000940)={0x208, r6, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x4004000}, 0x8000) 19:04:01 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:01 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) [ 263.464279][T20121] FAULT_INJECTION: forcing a failure. [ 263.464279][T20121] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 263.503916][T20122] ERROR: Out of memory at tomoyo_realpath_from_path. [ 263.539794][T20121] CPU: 0 PID: 20121 Comm: syz-executor.3 Not tainted 5.19.0-syzkaller-13930-g7ebfc85e2cd7 #0 [ 263.550000][T20121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 263.560069][T20121] Call Trace: [ 263.563352][T20121] [ 263.566288][T20121] dump_stack_lvl+0xcd/0x134 [ 263.571034][T20121] should_fail.cold+0x5/0xa [ 263.575547][T20121] _copy_to_user+0x2a/0x140 [ 263.580072][T20121] simple_read_from_buffer+0xcc/0x160 [ 263.585459][T20121] proc_fail_nth_read+0x187/0x220 [ 263.590498][T20121] ? proc_fault_inject_read+0x220/0x220 [ 263.596054][T20121] ? security_file_permission+0xab/0xd0 [ 263.601683][T20121] vfs_read+0x257/0x930 [ 263.605869][T20121] ? proc_fault_inject_read+0x220/0x220 [ 263.611426][T20121] ? kernel_read+0x1c0/0x1c0 [ 263.616031][T20121] ? __fget_files+0x26a/0x440 [ 263.620763][T20121] ksys_read+0x127/0x250 [ 263.625013][T20121] ? vfs_write+0xdd0/0xdd0 [ 263.629439][T20121] ? syscall_enter_from_user_mode+0x22/0xb0 [ 263.635398][T20121] do_syscall_64+0x35/0xb0 [ 263.639825][T20121] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 263.645785][T20121] RIP: 0033:0x7f7fab83be2c [ 263.650205][T20121] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 263.669904][T20121] RSP: 002b:00007f7faca00160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 263.678325][T20121] RAX: ffffffffffffffda RBX: 00007f7fab99bf80 RCX: 00007f7fab83be2c [ 263.686300][T20121] RDX: 000000000000000f RSI: 00007f7faca001e0 RDI: 0000000000000004 [ 263.694278][T20121] RBP: 00007f7faca001d0 R08: 0000000000000000 R09: 0000000000000000 [ 263.702248][T20121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 263.710217][T20121] R13: 00007ffd0e56609f R14: 00007f7faca00300 R15: 0000000000022000 [ 263.718195][T20121] 19:04:02 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x40, 0x8000, 0x1, 0xfffffffe, {{0x29, 0x4, 0x3, 0x7, 0xa4, 0x66, 0x0, 0x0, 0x2b, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0xb, 0x8c, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x23}]}, @generic={0x7, 0x9, "d94e85aeac6d34"}, @cipso={0x86, 0x16, 0x3, [{0x1, 0x10, "55d7cb9ced400274470ae51a1af8"}]}, @lsrr={0x83, 0x17, 0xac, [@private=0xa010101, @remote, @loopback, @loopback, @empty]}, @lsrr={0x83, 0x2b, 0xb8, [@remote, @empty, @multicast2, @empty, @multicast2, @multicast1, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @generic={0x86, 0x6, "17f032c3"}, @lsrr={0x83, 0x7, 0xc, [@multicast2]}, @lsrr={0x83, 0x13, 0x28, [@dev={0xac, 0x14, 0x14, 0x2f}, @local, @empty, @broadcast]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000800)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000840)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000bc0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000940)={0x208, r6, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x4004000}, 0x8000) 19:04:02 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x40, 0x8000, 0x1, 0xfffffffe, {{0x29, 0x4, 0x3, 0x7, 0xa4, 0x66, 0x0, 0x0, 0x2b, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0xb, 0x8c, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x23}]}, @generic={0x7, 0x9, "d94e85aeac6d34"}, @cipso={0x86, 0x16, 0x3, [{0x1, 0x10, "55d7cb9ced400274470ae51a1af8"}]}, @lsrr={0x83, 0x17, 0xac, [@private=0xa010101, @remote, @loopback, @loopback, @empty]}, @lsrr={0x83, 0x2b, 0xb8, [@remote, @empty, @multicast2, @empty, @multicast2, @multicast1, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @generic={0x86, 0x6, "17f032c3"}, @lsrr={0x83, 0x7, 0xc, [@multicast2]}, @lsrr={0x83, 0x13, 0x28, [@dev={0xac, 0x14, 0x14, 0x2f}, @local, @empty, @broadcast]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000800)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000840)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000bc0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000940)={0x208, r6, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x4004000}, 0x8000) 19:04:02 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 19:04:02 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00'}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x40, 0x8000, 0x1, 0xfffffffe, {{0x29, 0x4, 0x3, 0x7, 0xa4, 0x66, 0x0, 0x0, 0x2b, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0xb, 0x8c, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x23}]}, @generic={0x7, 0x9, "d94e85aeac6d34"}, @cipso={0x86, 0x16, 0x3, [{0x1, 0x10, "55d7cb9ced400274470ae51a1af8"}]}, @lsrr={0x83, 0x17, 0xac, [@private=0xa010101, @remote, @loopback, @loopback, @empty]}, @lsrr={0x83, 0x2b, 0xb8, [@remote, @empty, @multicast2, @empty, @multicast2, @multicast1, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @generic={0x86, 0x6, "17f032c3"}, @lsrr={0x83, 0x7, 0xc, [@multicast2]}, @lsrr={0x83, 0x13, 0x28, [@dev={0xac, 0x14, 0x14, 0x2f}, @local, @empty, @broadcast]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000800)={'vxcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000840)={'batadv_slave_0\x00'}) 19:04:02 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:02 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x7) 19:04:02 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) (fail_nth: 2) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:02 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00'}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x40, 0x8000, 0x1, 0xfffffffe, {{0x29, 0x4, 0x3, 0x7, 0xa4, 0x66, 0x0, 0x0, 0x2b, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0xb, 0x8c, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x23}]}, @generic={0x7, 0x9, "d94e85aeac6d34"}, @cipso={0x86, 0x16, 0x3, [{0x1, 0x10, "55d7cb9ced400274470ae51a1af8"}]}, @lsrr={0x83, 0x17, 0xac, [@private=0xa010101, @remote, @loopback, @loopback, @empty]}, @lsrr={0x83, 0x2b, 0xb8, [@remote, @empty, @multicast2, @empty, @multicast2, @multicast1, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @generic={0x86, 0x6, "17f032c3"}, @lsrr={0x83, 0x7, 0xc, [@multicast2]}, @lsrr={0x83, 0x13, 0x28, [@dev={0xac, 0x14, 0x14, 0x2f}, @local, @empty, @broadcast]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000800)={'vxcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000840)={'batadv_slave_0\x00'}) 19:04:02 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x700) 19:04:02 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00'}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x40, 0x8000, 0x1, 0xfffffffe, {{0x29, 0x4, 0x3, 0x7, 0xa4, 0x66, 0x0, 0x0, 0x2b, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0xb, 0x8c, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x23}]}, @generic={0x7, 0x9, "d94e85aeac6d34"}, @cipso={0x86, 0x16, 0x3, [{0x1, 0x10, "55d7cb9ced400274470ae51a1af8"}]}, @lsrr={0x83, 0x17, 0xac, [@private=0xa010101, @remote, @loopback, @loopback, @empty]}, @lsrr={0x83, 0x2b, 0xb8, [@remote, @empty, @multicast2, @empty, @multicast2, @multicast1, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @generic={0x86, 0x6, "17f032c3"}, @lsrr={0x83, 0x7, 0xc, [@multicast2]}, @lsrr={0x83, 0x13, 0x28, [@dev={0xac, 0x14, 0x14, 0x2f}, @local, @empty, @broadcast]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000800)={'vxcan0\x00'}) 19:04:02 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 1) 19:04:02 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:02 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00'}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x40, 0x8000, 0x1, 0xfffffffe, {{0x29, 0x4, 0x3, 0x7, 0xa4, 0x66, 0x0, 0x0, 0x2b, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0xb, 0x8c, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x23}]}, @generic={0x7, 0x9, "d94e85aeac6d34"}, @cipso={0x86, 0x16, 0x3, [{0x1, 0x10, "55d7cb9ced400274470ae51a1af8"}]}, @lsrr={0x83, 0x17, 0xac, [@private=0xa010101, @remote, @loopback, @loopback, @empty]}, @lsrr={0x83, 0x2b, 0xb8, [@remote, @empty, @multicast2, @empty, @multicast2, @multicast1, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @generic={0x86, 0x6, "17f032c3"}, @lsrr={0x83, 0x7, 0xc, [@multicast2]}, @lsrr={0x83, 0x13, 0x28, [@dev={0xac, 0x14, 0x14, 0x2f}, @local, @empty, @broadcast]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000800)={'vxcan0\x00'}) 19:04:02 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x7000000) 19:04:02 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00'}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x40, 0x8000, 0x1, 0xfffffffe, {{0x29, 0x4, 0x3, 0x7, 0xa4, 0x66, 0x0, 0x0, 0x2b, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0xb, 0x8c, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x23}]}, @generic={0x7, 0x9, "d94e85aeac6d34"}, @cipso={0x86, 0x16, 0x3, [{0x1, 0x10, "55d7cb9ced400274470ae51a1af8"}]}, @lsrr={0x83, 0x17, 0xac, [@private=0xa010101, @remote, @loopback, @loopback, @empty]}, @lsrr={0x83, 0x2b, 0xb8, [@remote, @empty, @multicast2, @empty, @multicast2, @multicast1, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @generic={0x86, 0x6, "17f032c3"}, @lsrr={0x83, 0x7, 0xc, [@multicast2]}, @lsrr={0x83, 0x13, 0x28, [@dev={0xac, 0x14, 0x14, 0x2f}, @local, @empty, @broadcast]}, @noop]}}}}}) 19:04:02 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) (fail_nth: 3) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:02 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x700000000000000) 19:04:02 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00'}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x40, 0x8000, 0x1, 0xfffffffe, {{0x29, 0x4, 0x3, 0x7, 0xa4, 0x66, 0x0, 0x0, 0x2b, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0xb, 0x8c, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x23}]}, @generic={0x7, 0x9, "d94e85aeac6d34"}, @cipso={0x86, 0x16, 0x3, [{0x1, 0x10, "55d7cb9ced400274470ae51a1af8"}]}, @lsrr={0x83, 0x17, 0xac, [@private=0xa010101, @remote, @loopback, @loopback, @empty]}, @lsrr={0x83, 0x2b, 0xb8, [@remote, @empty, @multicast2, @empty, @multicast2, @multicast1, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @generic={0x86, 0x6, "17f032c3"}, @lsrr={0x83, 0x7, 0xc, [@multicast2]}, @lsrr={0x83, 0x13, 0x28, [@dev={0xac, 0x14, 0x14, 0x2f}, @local, @empty, @broadcast]}, @noop]}}}}}) [ 264.187886][T20167] ERROR: Out of memory at tomoyo_realpath_from_path. 19:04:02 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 2) [ 264.289310][T20178] ERROR: Out of memory at tomoyo_realpath_from_path. 19:04:02 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000040)={0xed1, 0x7, 0x100}) write$cgroup_subtree(r0, 0x0, 0x0) 19:04:02 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "6a596533ff98e125548310fbc101b63479877d29a74791463d8edb174a73082f1f87d2138d4c07a17e24d7b5f859a931dc2c696e2adcecf9adf76e4363d1228a6542c6fb18d7964c5bb2d8474cc7cc1235a25b500dfcad3c2aaf5bd63f6ded2ab76d20fbd5a1cea226a346d769dd8ae0b5359738b45537b85077143a1f12de0f7c7f9c5a247f5b4a870534670b5fd10e81ac760c62aadebf8bfcd0a92913c1443da4dd1d0b1f1d228782dd240d9e14c23c34485c33521292dfce969f2e2a086c1d749e990596739db5eeb3fe5c3bf37c61359d59380946fc260b520dabd94ca5c5e446c75c78454885953b3491c24a2e686c123bbf4cdb0c2991a66d5e9a0be289a66cb9684a490da5d69020a14e96922e5e8ce717cf982c2d0a99ad881e3d3e887cb4d94ddd87e4aa45e4feb6640c0f46310b6261e9faec740848ea735b825bfe2ecd928f67a5aa70287e333bfb12e2e01e085abea6fffb02755c88372cf791b51a77c9992ad0107646b8441b7205ce4488e66a07a2ce7c0caab34b0141f213e6e303497e1c2ff6350eda07430f9f64ad4a7dcff5416064f1bef290fd0896e830999ebca8c1f89a25a7bb0703fe3c3f9cdbcb797523f05d55c35a3a1a0bef7b94f308c856c04d1b19463378488510d08d2e9bba12270edf0637d94948352bbeb265f654aac2b7b3f52e275c9d4a320e6db21b5b84425ef7701cefeccd0ab9b7"}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00'}) 19:04:02 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, 0x0) (async) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000040)={0xed1, 0x7, 0x100}) write$cgroup_subtree(r0, 0x0, 0x0) 19:04:02 executing program 4: sendto$phonet(0xffffffffffffffff, 0x0, 0x0, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:02 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00'}) 19:04:02 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000040)={0xed1, 0x7, 0x100}) write$cgroup_subtree(r0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) syz_open_dev$ttys(0xc, 0x2, 0x0) (async) ioctl$KDSKBSENT(r1, 0x4b49, 0x0) (async) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000040)={0xed1, 0x7, 0x100}) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) 19:04:02 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) (fail_nth: 4) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:02 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) [ 264.541204][T20202] syz-executor.0: vmalloc error: size 44096, vm_struct allocation failed, mode:0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0-1 [ 264.564088][T20202] CPU: 1 PID: 20202 Comm: syz-executor.0 Not tainted 5.19.0-syzkaller-13930-g7ebfc85e2cd7 #0 [ 264.574296][T20202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 264.584462][T20202] Call Trace: [ 264.587766][T20202] [ 264.590726][T20202] dump_stack_lvl+0xcd/0x134 [ 264.595354][T20202] warn_alloc.cold+0x9b/0x189 [ 264.600094][T20202] ? zone_watermark_ok_safe+0x370/0x370 [ 264.605674][T20202] ? kfree+0x25b/0x390 [ 264.609768][T20202] ? kfree+0x25b/0x390 [ 264.613872][T20202] ? __get_vm_area_node+0x297/0x3f0 [ 264.619100][T20202] __vmalloc_node_range+0xdf5/0x13a0 [ 264.624413][T20202] ? pointer+0x950/0x950 [ 264.628809][T20202] ? alloc_fd+0x2f0/0x6f0 [ 264.633253][T20202] ? lock_downgrade+0x6e0/0x6e0 [ 264.638110][T20202] ? kvm_dev_ioctl+0x213/0x1ce0 [ 264.642969][T20202] ? vfree_atomic+0xe0/0xe0 [ 264.647476][T20202] ? _raw_spin_unlock+0x24/0x40 [ 264.652330][T20202] ? alloc_fd+0x2f0/0x6f0 [ 264.656667][T20202] ? kvm_dev_ioctl+0x213/0x1ce0 [ 264.661525][T20202] __vmalloc+0x69/0x80 [ 264.665599][T20202] ? kvm_dev_ioctl+0x213/0x1ce0 [ 264.670559][T20202] ? kvm_stat_data_open+0x380/0x380 [ 264.675787][T20202] kvm_dev_ioctl+0x213/0x1ce0 [ 264.680477][T20202] ? __ct_user_exit+0xff/0x150 [ 264.685254][T20202] ? lock_downgrade+0x68b/0x6e0 [ 264.690120][T20202] ? kvm_stat_data_open+0x380/0x380 [ 264.695327][T20202] ? selinux_file_ioctl+0xb1/0x270 [ 264.700590][T20202] ? kvm_stat_data_open+0x380/0x380 [ 264.705802][T20202] __x64_sys_ioctl+0x193/0x200 [ 264.710579][T20202] do_syscall_64+0x35/0xb0 [ 264.715003][T20202] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 264.720898][T20202] RIP: 0033:0x7ff24ea89279 [ 264.725312][T20202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 264.744926][T20202] RSP: 002b:00007ff24fba1168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.753360][T20202] RAX: ffffffffffffffda RBX: 00007ff24eb9bf80 RCX: 00007ff24ea89279 [ 264.761332][T20202] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000005 [ 264.769316][T20202] RBP: 00007ff24fba11d0 R08: 0000000000000000 R09: 0000000000000000 [ 264.777287][T20202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 19:04:03 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0xd4, 0xffffff7f, 0x64, @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x700, 0x8, 0x0, 0xfffffff9}}) [ 264.785258][T20202] R13: 00007ffd18de455f R14: 00007ff24fba1300 R15: 0000000000022000 [ 264.793320][T20202] [ 264.802850][T20202] Mem-Info: [ 264.806185][T20202] active_anon:414 inactive_anon:15240 isolated_anon:0 [ 264.806185][T20202] active_file:11335 inactive_file:500 isolated_file:0 [ 264.806185][T20202] unevictable:768 dirty:42 writeback:0 [ 264.806185][T20202] slab_reclaimable:23945 slab_unreclaimable:112967 [ 264.806185][T20202] mapped:18061 shmem:1417 pagetables:542 bounce:0 [ 264.806185][T20202] kernel_misc_reclaimable:0 19:04:03 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) getsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) 19:04:03 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) 19:04:03 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 3) [ 264.806185][T20202] free:1411018 free_pcp:3788 free_cma:0 19:04:03 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) getsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) getsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) 19:04:03 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) 19:04:03 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) [ 264.959510][T20202] Node 0 active_anon:1656kB inactive_anon:61060kB active_file:45268kB inactive_file:2000kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:72244kB dirty:164kB writeback:0kB shmem:4132kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:10112kB pagetables:2268kB all_unreclaimable? no [ 264.965869][T20218] ERROR: Out of memory at tomoyo_realpath_from_path. [ 265.043040][T20202] Node 1 active_anon:0kB inactive_anon:0kB active_file:72kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:1536kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB all_unreclaimable? no 19:04:03 executing program 4: sendto$phonet(0xffffffffffffffff, 0x0, 0x0, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:03 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) getsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) getsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) 19:04:03 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)={0x3, "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"}) [ 265.080710][T20202] Node 0 DMA free:15360kB boost:0kB min:200kB low:248kB high:296kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 265.112271][T20202] lowmem_reserve[]: 0 2631 2632 2632 2632 [ 265.125442][T20202] Node 0 DMA32 free:1671600kB boost:0kB min:35556kB low:44444kB high:53332kB reserved_highatomic:0KB active_anon:1656kB inactive_anon:60960kB active_file:45268kB inactive_file:2000kB unevictable:1536kB writepending:164kB present:3129332kB managed:2699840kB mlocked:0kB bounce:0kB free_pcp:15144kB local_pcp:10668kB free_cma:0kB [ 265.158030][T20202] lowmem_reserve[]: 0 0 0 0 0 [ 265.163089][T20202] Node 0 Normal free:0kB boost:0kB min:12kB low:12kB high:12kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:912kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 265.192093][T20202] lowmem_reserve[]: 0 0 0 0 0 [ 265.197214][T20202] Node 1 Normal free:3956616kB boost:0kB min:54336kB low:67920kB high:81504kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:72kB inactive_file:0kB unevictable:1536kB writepending:4kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 265.235185][T20202] lowmem_reserve[]: 0 0 0 0 0 [ 265.240045][T20202] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 265.280160][T20202] Node 0 DMA32: 2332*4kB (UME) 845*8kB (UE) 989*16kB (UE) 135*32kB (U) 81*64kB (UE) 10*128kB (U) 2*256kB (UE) 27*512kB (UME) 14*1024kB (ME) 9*2048kB (ME) 386*4096kB (M) = 1670856kB [ 265.301940][T20202] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 265.315540][T20202] Node 1 Normal: 138*4kB (UE) 196*8kB (UE) 120*16kB (UM) 88*32kB (UME) 65*64kB (UME) 35*128kB (U) 11*256kB (U) 8*512kB (UE) 2*1024kB (UM) 0*2048kB 960*4096kB (M) = 3956616kB [ 265.354901][T20202] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 265.365056][T20202] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 265.374506][T20202] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 265.384699][T20202] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 265.406943][T20202] 13252 total pagecache pages [ 265.421516][T20202] 0 pages in swap cache [ 265.431281][T20202] Free swap = 0kB [ 265.435544][T20202] Total swap = 0kB [ 265.440622][T20202] 2097051 pages RAM [ 265.451976][T20202] 0 pages HighMem/MovableOnly [ 265.457556][T20202] 388618 pages reserved [ 265.462113][T20202] 0 pages cma reserved 19:04:04 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:04 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) syz_open_dev$ttys(0xc, 0x2, 0x0) 19:04:04 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x0, 0xa77d) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xd, 0x4, 0x3, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0x7, 0x8c, [@rand_addr=0x64010100]}, @cipso={0x86, 0x6, 0x3}, @lsrr={0x83, 0xf, 0x0, [@multicast2, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @generic={0x0, 0x2}]}}}}}) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) 19:04:04 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) syz_open_dev$ttys(0xc, 0x2, 0x0) 19:04:04 executing program 4: sendto$phonet(0xffffffffffffffff, 0x0, 0x0, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:04 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 4) 19:04:04 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 5) 19:04:04 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) 19:04:04 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private, 0x0}, &(0x7f0000000280)=0xc) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0xff, 0x6, @remote}, 0x14) 19:04:04 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 6) 19:04:04 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:04 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") socket(0x8, 0x800, 0xa77d) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private}, &(0x7f0000000280)=0xc) 19:04:04 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x2, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:04 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 7) 19:04:04 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") r3 = socket(0x8, 0x800, 0xa77d) recvfrom$packet(r3, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, 0x0, 0x1, 0xff, 0x6, @remote}, 0x14) 19:04:04 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) (async) r0 = socket(0x0, 0x0, 0xa77d) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xd, 0x4, 0x3, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0x7, 0x8c, [@rand_addr=0x64010100]}, @cipso={0x86, 0x6, 0x3}, @lsrr={0x83, 0xf, 0x0, [@multicast2, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @generic={0x0, 0x2}]}}}}}) (async) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) 19:04:04 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private}, &(0x7f0000000280)=0xc) 19:04:04 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:04 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private}, &(0x7f0000000280)=0xc) 19:04:04 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="09909e58c2c7ed3614bde5e5b2279659b19878f66cb429efd9c041") recvfrom$packet(0xffffffffffffffff, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, 0x0, 0x1, 0xff, 0x6, @remote}, 0x14) 19:04:04 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x10, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:04 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x0, 0xa77d) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000007c0)={'gretap0\x00', &(0x7f00000006c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xd, 0x4, 0x3, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @private=0xa010102, @loopback, {[@lsrr={0x83, 0x7, 0x8c, [@rand_addr=0x64010100]}, @cipso={0x86, 0x6, 0x3}, @lsrr={0x83, 0xf, 0x0, [@multicast2, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @generic={0x0, 0x2}]}}}}}) (async) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) 19:04:04 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x4b47, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:04 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) syz_open_dev$ttys(0xc, 0x2, 0x1) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private}, &(0x7f0000000280)=0xc) 19:04:04 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 8) 19:04:04 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) recvfrom$packet(0xffffffffffffffff, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, 0x0, 0x1, 0xff, 0x6, @remote}, 0x14) 19:04:04 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x4b49, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:05 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) syz_open_dev$ttys(0xc, 0x2, 0x1) recvfrom$packet(0xffffffffffffffff, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, 0x0, 0x1, 0xff, 0x6, @remote}, 0x14) 19:04:05 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000040)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000140)) 19:04:05 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:05 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000040)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000140)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000040)) (async) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000140)) (async) 19:04:05 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x541b, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:05 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000040)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000140)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000040)) (async) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000140)) (async) 19:04:05 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private}, &(0x7f0000000280)=0xc) 19:04:05 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 9) 19:04:05 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private}, &(0x7f0000000280)=0xc) 19:04:05 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x83, 0x5, 0x8}) recvfrom$packet(0xffffffffffffffff, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, 0x0, 0x1, 0xff, 0x6, @remote}, 0x14) 19:04:05 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x5421, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:05 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000280)=0x6) ioctl$KDSKBSENT(r1, 0x4b49, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000040)={0x9, "0c2770274102ec74b6d6e74d0bc930eab7ac54090c910c130b14059dd762a598ffe3cd2a59fec700deb3100b7fb15eed39ff22ca6b73cebcba5f0093b8179f85fca2fd6df370add8af61e9fcc2a0fcb7de26fab498540135710600d2321191729213becd60f27400640d99002f24c1985718721028ad2e31f8dea92d7153575a293180b90050f290269ad584eba6826360836ec70b9d2fc26752cfda73048eff383dbef43036c51b878838872f778e05fdde86d96cf5b246e84501125eb66e41b39cd3525467b82b2a945787e2982252218c5cde651064b25eae513ac7096c65b28fa244388c556034dc1b9a4d5c3714853de0ca8b5c471a846300658233e942711ec65f1b287f3e41b3b084a4fe172c6efd7768abe8a91b51b0818168b6d510f2431bc97be3eb61d7fae4d83ba1be36342198cd80eaed928d06c7cd9bd08c5d890ed577fb84d20bdfa4d9266d2ae347c17d81e73d750bbf2b597462129d3deaeb82e0eff4582fe06aa76c79cb338b505734125ca09f7681aee9b4cb9dcac932bc937388185959fcb93b83561e2544c8e32074b0e07ddef84a4affff5fed4c1a466113bb38dfe3d0ed635d5ebf37285fccb296ccbc50d0cfbbb5898797d086ad064979ff5c077919ce1548ef869448195e14949f176fb1b6d37c7de87ff16ea31525e3b61c359749c3d45be856c492b5864be4cb796ee0a579acbb1793fbc801"}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000300)) ioctl$KDSKBSENT(r2, 0x4b49, 0x0) syz_open_pts(r2, 0x2) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000380)=""/170) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f00000002c0)) getitimer(0x0, &(0x7f0000000340)) 19:04:05 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @private}, &(0x7f0000000280)=0xc) 19:04:05 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000240)={@empty, @private}, &(0x7f0000000280)=0xc) 19:04:05 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690d", 0x57, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:05 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x3, 0x9, 0x5}) recvfrom$packet(0xffffffffffffffff, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, 0x0, 0x1, 0xff, 0x6, @remote}, 0x14) 19:04:05 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x5450, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:05 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000280)=0x6) (async) ioctl$KDSKBSENT(r1, 0x4b49, 0x0) (async) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000040)={0x9, "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"}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) (async) r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000300)) (async) ioctl$KDSKBSENT(r2, 0x4b49, 0x0) syz_open_pts(r2, 0x2) (async) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000380)=""/170) (async) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f00000002c0)) (async) getitimer(0x0, &(0x7f0000000340)) 19:04:05 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000240)={@empty, @private}, &(0x7f0000000280)=0xc) 19:04:05 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 10) 19:04:05 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 11) 19:04:05 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, 0x0, 0x1, 0xff, 0x6, @remote}, 0x14) 19:04:05 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x5451, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:05 executing program 2: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000240)={@empty, @private}, &(0x7f0000000280)=0xc) 19:04:05 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000280)=0x6) (async) ioctl$KDSKBSENT(r1, 0x4b49, 0x0) (async) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000040)={0x9, "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"}) (async) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) (async) r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000300)) (async) ioctl$KDSKBSENT(r2, 0x4b49, 0x0) (async) syz_open_pts(r2, 0x2) (async) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000380)=""/170) (async) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f00000002c0)) (async) getitimer(0x0, &(0x7f0000000340)) 19:04:05 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 12) 19:04:05 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690d", 0x57, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:05 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="28b2cc51a129203dc9be777a86c5f89840bf55b8c693c28e2864b51aaab0f0e030c5a3e4d46d491dd3623a1b08e8443398e11ad1784a0ccc2dad6a83100529d71588052eceb14668dabe7dbe63f309ef8d869ecefd329b1ce009a736ec5b95fd3616") recvfrom$packet(0xffffffffffffffff, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, 0x0, 0x1, 0xff, 0x6, @remote}, 0x14) 19:04:05 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x5452, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:05 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) write$cgroup_subtree(r0, 0x0, 0x0) 19:04:05 executing program 2: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@empty, @private}, &(0x7f0000000280)=0xc) 19:04:05 executing program 5: syz_open_pts(0xffffffffffffffff, 0x40000) recvfrom$packet(0xffffffffffffffff, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, 0x0, 0x1, 0xff, 0x6, @remote}, 0x14) 19:04:05 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 13) 19:04:05 executing program 2: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)) 19:04:05 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x5460, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:05 executing program 5: recvfrom$packet(0xffffffffffffffff, &(0x7f00000001c0)=""/80, 0x50, 0x2002, &(0x7f00000002c0)={0x11, 0x8, 0x0, 0x1, 0xff, 0x6, @remote}, 0x14) 19:04:05 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690d", 0x57, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 267.400447][ T27] audit: type=1400 audit(1660676645.834:122): avc: denied { create } for pid=20398 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 19:04:05 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 14) 19:04:05 executing program 2: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:04:05 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) (async) write$cgroup_subtree(r0, 0x0, 0x0) 19:04:05 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x8933, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:06 executing program 5: recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x2002, &(0x7f00000002c0)={0x11, 0x8, 0x0, 0x1, 0xff, 0x6, @remote}, 0x14) 19:04:06 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x5460, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:06 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) write$cgroup_subtree(r0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) socket$l2tp6(0xa, 0x2, 0x73) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) 19:04:06 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 15) 19:04:06 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x5460, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:06 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c6", 0x83, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:06 executing program 5: recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x11, 0x8, 0x0, 0x1, 0xff, 0x6, @remote}, 0x14) 19:04:06 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000040)={0x3, @null, 0xee00}) 19:04:06 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae00, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:06 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 16) 19:04:06 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000040)={0x3, @null, 0xee00}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000040)={0x3, @null, 0xee00}) (async) 19:04:06 executing program 5: recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 19:04:06 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae02, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:06 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x5460, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:06 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 17) 19:04:06 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae00, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:06 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000040)={0x3, @null, 0xee00}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000040)={0x3, @null, 0xee00}) (async) 19:04:06 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c6", 0x83, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:06 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae03, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:06 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x5460, 0x0) 19:04:06 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae00, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:06 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 18) 19:04:06 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae04, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:06 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) r1 = socket(0x2a, 0x6, 0x99d) sendmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000040)=@ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="2d5bfc8c90050959401107565963cff2f5b835df3c6652056cbeecc7cade2c4e82e6cd96585fdd4590ad22300b043f1b7ffd436600c3fba002ef86e7219635b2ff1e91205383758c2571380272fb0687f1ac7bce61df88a7d292c090af13ce02492150a76056db1c9b303a3f25ce371ce462f9f16e061645907e8911fb64d20f451db839cbbc16ce080f592958a603aa92a8fe47a06b2d2d4e93e90edf49505503152fe8e8056a605f471c939f1b4563981797457ec81d7fb2b4f1886d561b33c9fc4100930b07b4d5272414436e2583d88dc4ac6c6a390f055d826beccb5f65bfc7ce24a6523051ed796d834e728e215027af99f2d5ec7f6d", 0xf9}, {&(0x7f00000001c0)="41f6ec152fa9f8bcc59c6450469a12ebbe47583177909537f9b97be7c7e7bccf1f3108b9027d6e676c7dcd42739e63aeb1f5c7efe4948d4dc29be8d2dcd0390fb10c6f7a10ef418742718f86d4274ef342883789e6be13c69d4e3b78be05cf17", 0x60}], 0x2}, 0x8000) 19:04:06 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0x5460, 0x0) 19:04:06 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae05, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:06 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_CREATE_VM(r2, 0x5460, 0x0) 19:04:06 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae00, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:06 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae06, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) [ 268.218908][ T27] audit: type=1400 audit(1660676646.654:123): avc: denied { create } for pid=20478 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 19:04:06 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c6", 0x83, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:06 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 19) 19:04:06 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) r1 = socket(0x2a, 0x6, 0x99d) sendmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000040)=@ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="2d5bfc8c90050959401107565963cff2f5b835df3c6652056cbeecc7cade2c4e82e6cd96585fdd4590ad22300b043f1b7ffd436600c3fba002ef86e7219635b2ff1e91205383758c2571380272fb0687f1ac7bce61df88a7d292c090af13ce02492150a76056db1c9b303a3f25ce371ce462f9f16e061645907e8911fb64d20f451db839cbbc16ce080f592958a603aa92a8fe47a06b2d2d4e93e90edf49505503152fe8e8056a605f471c939f1b4563981797457ec81d7fb2b4f1886d561b33c9fc4100930b07b4d5272414436e2583d88dc4ac6c6a390f055d826beccb5f65bfc7ce24a6523051ed796d834e728e215027af99f2d5ec7f6d", 0xf9}, {&(0x7f00000001c0)="41f6ec152fa9f8bcc59c6450469a12ebbe47583177909537f9b97be7c7e7bccf1f3108b9027d6e676c7dcd42739e63aeb1f5c7efe4948d4dc29be8d2dcd0390fb10c6f7a10ef418742718f86d4274ef342883789e6be13c69d4e3b78be05cf17", 0x60}], 0x2}, 0x8000) 19:04:06 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_CREATE_VM(r2, 0x5460, 0x0) 19:04:06 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae07, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:06 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 20) 19:04:06 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae00, 0x0) 19:04:06 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) r1 = socket(0x2a, 0x6, 0x99d) sendmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000040)=@ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="2d5bfc8c90050959401107565963cff2f5b835df3c6652056cbeecc7cade2c4e82e6cd96585fdd4590ad22300b043f1b7ffd436600c3fba002ef86e7219635b2ff1e91205383758c2571380272fb0687f1ac7bce61df88a7d292c090af13ce02492150a76056db1c9b303a3f25ce371ce462f9f16e061645907e8911fb64d20f451db839cbbc16ce080f592958a603aa92a8fe47a06b2d2d4e93e90edf49505503152fe8e8056a605f471c939f1b4563981797457ec81d7fb2b4f1886d561b33c9fc4100930b07b4d5272414436e2583d88dc4ac6c6a390f055d826beccb5f65bfc7ce24a6523051ed796d834e728e215027af99f2d5ec7f6d", 0xf9}, {&(0x7f00000001c0)="41f6ec152fa9f8bcc59c6450469a12ebbe47583177909537f9b97be7c7e7bccf1f3108b9027d6e676c7dcd42739e63aeb1f5c7efe4948d4dc29be8d2dcd0390fb10c6f7a10ef418742718f86d4274ef342883789e6be13c69d4e3b78be05cf17", 0x60}], 0x2}, 0x8000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) socket(0x2a, 0x6, 0x99d) (async) sendmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000040)=@ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="2d5bfc8c90050959401107565963cff2f5b835df3c6652056cbeecc7cade2c4e82e6cd96585fdd4590ad22300b043f1b7ffd436600c3fba002ef86e7219635b2ff1e91205383758c2571380272fb0687f1ac7bce61df88a7d292c090af13ce02492150a76056db1c9b303a3f25ce371ce462f9f16e061645907e8911fb64d20f451db839cbbc16ce080f592958a603aa92a8fe47a06b2d2d4e93e90edf49505503152fe8e8056a605f471c939f1b4563981797457ec81d7fb2b4f1886d561b33c9fc4100930b07b4d5272414436e2583d88dc4ac6c6a390f055d826beccb5f65bfc7ce24a6523051ed796d834e728e215027af99f2d5ec7f6d", 0xf9}, {&(0x7f00000001c0)="41f6ec152fa9f8bcc59c6450469a12ebbe47583177909537f9b97be7c7e7bccf1f3108b9027d6e676c7dcd42739e63aeb1f5c7efe4948d4dc29be8d2dcd0390fb10c6f7a10ef418742718f86d4274ef342883789e6be13c69d4e3b78be05cf17", 0x60}], 0x2}, 0x8000) (async) 19:04:06 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) ioctl$KVM_CREATE_VM(r2, 0x5460, 0x0) 19:04:06 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)) write$cgroup_subtree(r0, 0x0, 0x0) 19:04:06 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae08, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:06 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 21) 19:04:07 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae00, 0x0) 19:04:07 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc03", 0x99, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:07 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)) write$cgroup_subtree(r0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) socket$packet(0x11, 0x3, 0x300) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) [ 268.546604][ T27] audit: type=1400 audit(1660676646.964:124): avc: denied { create } for pid=20513 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 19:04:07 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_CREATE_VM(r2, 0x5460, 0x0) 19:04:07 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae09, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:07 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 22) [ 268.649211][ T27] audit: type=1400 audit(1660676647.004:125): avc: denied { ioctl } for pid=20513 comm="syz-executor.3" path="socket:[185348]" dev="sockfs" ino=185348 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 19:04:07 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_CREATE_VM(r2, 0x5460, 0x0) 19:04:07 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_CREATE_VM(r2, 0xae00, 0x0) 19:04:07 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae0a, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:07 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae00, 0x0) 19:04:07 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)) (async) write$cgroup_subtree(r0, 0x0, 0x0) 19:04:07 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 23) 19:04:07 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) ioctl$KVM_CREATE_VM(r2, 0xae00, 0x0) 19:04:07 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc03", 0x99, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:07 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_CREATE_VM(r2, 0x5460, 0x0) 19:04:07 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae0b, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:07 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x600000, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 19:04:07 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 24) 19:04:07 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0x5460, 0x0) 19:04:07 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_CREATE_VM(r2, 0xae00, 0x0) 19:04:07 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae0f, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:07 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x600000, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 19:04:07 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0x5460, 0x0) 19:04:07 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_CREATE_VM(r2, 0xae00, 0x0) 19:04:07 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae13, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:07 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc03", 0x99, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:07 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae00, 0x0) 19:04:07 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x600000, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x600000, 0x0) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) 19:04:07 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 25) 19:04:07 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae2d, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:07 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0x5460, 0x0) 19:04:07 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae63, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:07 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) r1 = syz_open_dev$I2C(&(0x7f0000000040), 0x7, 0x8401) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000a00)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000001340)={&(0x7f0000000d40), 0xc, &(0x7f0000001300)={&(0x7f0000001040)={0x2c, r4, 0x115, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x2c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) ioctl$I2C_SMBUS(r1, 0x720, &(0x7f0000000140)={0x1, 0x3, 0x3, &(0x7f0000000100)={0x5, "9b6e77cbe1e9f4f1cd7d423ab3097db38a28b5021038dc183d15022da39167db43"}}) ioctl$I2C_TIMEOUT(r2, 0x702, 0x7fffffff) ioctl$I2C_TIMEOUT(r1, 0x702, 0x5104b823) 19:04:08 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) (async) r1 = syz_open_dev$I2C(&(0x7f0000000040), 0x7, 0x8401) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000a00)={0x14}, 0x14}}, 0x0) (async) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000001340)={&(0x7f0000000d40), 0xc, &(0x7f0000001300)={&(0x7f0000001040)={0x2c, r4, 0x115, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x2c}}, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$I2C_SMBUS(r1, 0x720, &(0x7f0000000140)={0x1, 0x3, 0x3, &(0x7f0000000100)={0x5, "9b6e77cbe1e9f4f1cd7d423ab3097db38a28b5021038dc183d15022da39167db43"}}) (async) ioctl$I2C_TIMEOUT(r2, 0x702, 0x7fffffff) ioctl$I2C_TIMEOUT(r1, 0x702, 0x5104b823) 19:04:08 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 26) 19:04:08 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae00, 0x0) 19:04:08 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae83, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:08 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce799", 0xa4, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:08 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_CREATE_VM(r1, 0x5460, 0x0) 19:04:08 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae00, 0x0) 19:04:08 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) (async) r1 = syz_open_dev$I2C(&(0x7f0000000040), 0x7, 0x8401) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000a00)={0x14}, 0x14}}, 0x0) (async) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000001340)={&(0x7f0000000d40), 0xc, &(0x7f0000001300)={&(0x7f0000001040)={0x2c, r4, 0x115, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x2c}}, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$I2C_SMBUS(r1, 0x720, &(0x7f0000000140)={0x1, 0x3, 0x3, &(0x7f0000000100)={0x5, "9b6e77cbe1e9f4f1cd7d423ab3097db38a28b5021038dc183d15022da39167db43"}}) (async) ioctl$I2C_TIMEOUT(r2, 0x702, 0x7fffffff) (async) ioctl$I2C_TIMEOUT(r1, 0x702, 0x5104b823) 19:04:08 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 27) 19:04:08 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_CREATE_VM(r1, 0x5460, 0x0) 19:04:08 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x400448c9, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:08 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae00, 0x0) 19:04:08 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5460, 0x0) 19:04:08 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000040)={0x1, "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"}) write$cgroup_subtree(r0, 0x0, 0x0) 19:04:08 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x400448dd, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:08 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 28) 19:04:08 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce799", 0xa4, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:08 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5460, 0x0) 19:04:08 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae00, 0x0) 19:04:08 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000040)={0x1, "5ed12e5e2a448cd874a2bcf9f57a1b435d478e706347967b5b84884f854080f636ecd19895ebad2cdfcecd7181d077d75c5af7dc5dec8fbf5e5a0a8b53ccbe7b0bdde234db103346a84e8fc5733945587530d46f4f35e4833607f64d7a9dd5166c24dc39e051627050fd294811b2089b32eb5965d2b1a871b9bdabfbca40837ef31d1b6339657bdb1c2165a9c0728b9b200e9a179746e9fe5d481823d04bf001c8615f25d7afcd82ecf08188aa24df200341c44adfceb3448781bcca0cb05a24310a2bacabfd833e370938648c6809a8f322d0c2a3b42a7a18a3458ed213dd32441799c49de6c471674917e4c7e8080893b81ceda21af00fee6fb9c43679c5bcd771c6cf87aac488eb7e08ceb805b1a0772c3c70242a47f4a93e803bee4dccc19481ab726c52c955e3a374e0130e091907208f01f2cd9f067219d12f6eaa6cfc9b4abd016a372d6fdcce0cba748c8d2b59236e15d5f53d7dd12ab374a8bedd10ff1dac5f36ac5e5f51830fc8660456f4a6911b63385b3b694fdde96d7225727ac032770de5e00392013521363202dad0db53d1dda33d8592e1fad68b287c9880f7d15900e41b23dfdbc7183a41a9988914ef8e915e96c05f4fd883cb7efe9ace730a372e0c01278c638e7963c32ae4c76edb2792a8b5ecee9bf42fd77e4164f34e7637aeb0cb30941d9968a5c6495ce3f1f0c0e61221e96bcb4948252a6f00f0"}) write$cgroup_subtree(r0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000040)={0x1, "5ed12e5e2a448cd874a2bcf9f57a1b435d478e706347967b5b84884f854080f636ecd19895ebad2cdfcecd7181d077d75c5af7dc5dec8fbf5e5a0a8b53ccbe7b0bdde234db103346a84e8fc5733945587530d46f4f35e4833607f64d7a9dd5166c24dc39e051627050fd294811b2089b32eb5965d2b1a871b9bdabfbca40837ef31d1b6339657bdb1c2165a9c0728b9b200e9a179746e9fe5d481823d04bf001c8615f25d7afcd82ecf08188aa24df200341c44adfceb3448781bcca0cb05a24310a2bacabfd833e370938648c6809a8f322d0c2a3b42a7a18a3458ed213dd32441799c49de6c471674917e4c7e8080893b81ceda21af00fee6fb9c43679c5bcd771c6cf87aac488eb7e08ceb805b1a0772c3c70242a47f4a93e803bee4dccc19481ab726c52c955e3a374e0130e091907208f01f2cd9f067219d12f6eaa6cfc9b4abd016a372d6fdcce0cba748c8d2b59236e15d5f53d7dd12ab374a8bedd10ff1dac5f36ac5e5f51830fc8660456f4a6911b63385b3b694fdde96d7225727ac032770de5e00392013521363202dad0db53d1dda33d8592e1fad68b287c9880f7d15900e41b23dfdbc7183a41a9988914ef8e915e96c05f4fd883cb7efe9ace730a372e0c01278c638e7963c32ae4c76edb2792a8b5ecee9bf42fd77e4164f34e7637aeb0cb30941d9968a5c6495ce3f1f0c0e61221e96bcb4948252a6f00f0"}) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) 19:04:08 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae00, 0x0) 19:04:08 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 29) 19:04:08 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x400454ca, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5460, 0x0) 19:04:08 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000040)={0x1, "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"}) write$cgroup_subtree(r0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000040)={0x1, "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"}) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) 19:04:08 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae00, 0x0) 19:04:08 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x40049409, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x1101, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5460, 0x0) 19:04:08 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce799", 0xa4, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:08 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 30) 19:04:08 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0xfffffffffffffff7) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000200)={r1, r2, 0x25, 0xe}, 0x10) r3 = syz_open_pts(r0, 0x109844) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000340)=ANY=[]}) r6 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSRS485(r6, 0x542f, &(0x7f0000000300)={0x2, 0x3f6b, 0x4}) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f0000000040)=""/236) 19:04:08 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae00, 0x0) 19:04:08 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x40086602, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x1101, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5460, 0x0) 19:04:08 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 31) 19:04:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae00, 0x0) [ 270.484172][ T27] audit: type=1400 audit(1660676648.914:126): avc: denied { ioctl } for pid=20669 comm="syz-executor.3" path="socket:[185071]" dev="sockfs" ino=185071 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 270.565177][ T27] audit: type=1400 audit(1660676648.984:127): avc: denied { setattr } for pid=20680 comm="syz-executor.0" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 19:04:09 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x40087602, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x1101, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae00, 0x0) 19:04:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x1101, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5460, 0x0) 19:04:09 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 32) 19:04:09 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf3", 0xa9, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5460, 0x0) 19:04:09 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0xfffffffffffffff7) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000200)={r1, r2, 0x25, 0xe}, 0x10) r3 = syz_open_pts(r0, 0x109844) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000340)=ANY=[]}) r6 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSRS485(r6, 0x542f, &(0x7f0000000300)={0x2, 0x3f6b, 0x4}) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f0000000040)=""/236) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0xfffffffffffffff7) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)) (async) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000200)={r1, r2, 0x25, 0xe}, 0x10) (async) syz_open_pts(r0, 0x109844) (async) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) syz_open_dev$ttys(0xc, 0x2, 0x0) (async) ioctl$KDSKBSENT(r5, 0x4b49, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000340)=ANY=[]}) (async) syz_open_dev$ttys(0xc, 0x2, 0x1) (async) ioctl$TIOCSRS485(r6, 0x542f, &(0x7f0000000300)={0x2, 0x3f6b, 0x4}) (async) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f0000000040)=""/236) (async) 19:04:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x1101, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae00, 0x0) 19:04:09 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x4008ae06, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:09 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 33) 19:04:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x1101, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae00, 0x0) 19:04:09 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0x5460, 0x0) 19:04:09 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x40186366, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae00, 0x0) 19:04:09 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf3", 0xa9, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:09 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0x5460, 0x0) 19:04:09 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0xfffffffffffffff7) (async) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000200)={r1, r2, 0x25, 0xe}, 0x10) (async) r3 = syz_open_pts(r0, 0x109844) (async) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)) (async) r4 = socket$inet_udplite(0x2, 0x2, 0x88) (async) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000340)=ANY=[]}) r6 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSRS485(r6, 0x542f, &(0x7f0000000300)={0x2, 0x3f6b, 0x4}) (async) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f0000000040)=""/236) 19:04:09 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 34) 19:04:09 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae00, 0x0) 19:04:09 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x401c5820, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:09 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x4020940d, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:09 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae00, 0x0) 19:04:09 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0x5460, 0x0) 19:04:09 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf3", 0xa9, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:09 executing program 3: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$I2C_FUNCS(0xffffffffffffffff, 0x705, &(0x7f0000000040)=0x6) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x7, 0x7, 0x9, 0x8b2, 0x8001}) 19:04:09 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae00, 0x0) 19:04:09 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x401c5820, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:09 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x80086301, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:09 executing program 3: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$I2C_FUNCS(0xffffffffffffffff, 0x705, &(0x7f0000000040)=0x6) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x7, 0x7, 0x9, 0x8b2, 0x8001}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$I2C_FUNCS(0xffffffffffffffff, 0x705, &(0x7f0000000040)=0x6) (async) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x7, 0x7, 0x9, 0x8b2, 0x8001}) (async) 19:04:10 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 35) 19:04:10 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x80086601, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:10 executing program 3: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$I2C_FUNCS(0xffffffffffffffff, 0x705, &(0x7f0000000040)=0x6) (async) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x7, 0x7, 0x9, 0x8b2, 0x8001}) 19:04:10 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x4020940d, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:10 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x401c5820, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:10 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 19:04:10 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae0", 0xac, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:10 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x80087601, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:10 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x401c5820, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:10 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 36) [ 271.761365][ T27] audit: type=1400 audit(1660676650.194:128): avc: denied { create } for pid=20785 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 19:04:10 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) (async) socket$alg(0x26, 0x5, 0x0) 19:04:10 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x4020940d, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:10 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x801c581f, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:10 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) (async) socket$alg(0x26, 0x5, 0x0) 19:04:10 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x401c5820, 0x0) 19:04:10 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x4020940d, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) [ 271.943592][T20798] debugfs: out of free dentries, can not create directory '20798-5' 19:04:10 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0x401c5820, 0x0) 19:04:10 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xc0045878, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:10 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae0", 0xac, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:10 executing program 3: ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0xdf) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) write$cgroup_subtree(r0, 0x0, 0x0) 19:04:10 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 37) 19:04:10 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_CREATE_VM(r2, 0x401c5820, 0x0) 19:04:10 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0x4020940d, 0x0) 19:04:10 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xc0045878, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:10 executing program 3: ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0xdf) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) write$cgroup_subtree(r0, 0x0, 0x0) 19:04:10 executing program 3: ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0xdf) (async) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) (async) write$cgroup_subtree(r0, 0x0, 0x0) 19:04:10 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_CREATE_VM(r2, 0x401c5820, 0x0) [ 272.167070][T20823] debugfs: out of free dentries, can not create directory '20823-5' 19:04:10 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae0", 0xac, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:10 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_CREATE_VM(r2, 0x4020940d, 0x0) 19:04:10 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) ioctl$KVM_CREATE_VM(r2, 0x401c5820, 0x0) 19:04:10 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 38) 19:04:10 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xc0189436, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:10 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x11d900, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000a00)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000001340)={&(0x7f0000000d40), 0xff4e, &(0x7f0000001300)={&(0x7f0000001040)={0x2c, r3, 0x115, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x2c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00'}) ioctl$NBD_DO_IT(r1, 0xab03) write$cgroup_subtree(r0, 0x0, 0x13) 19:04:10 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_CREATE_VM(r2, 0x4020940d, 0x0) 19:04:10 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x11d900, 0x0) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000a00)={0x14}, 0x14}}, 0x0) (async) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000001340)={&(0x7f0000000d40), 0xff4e, &(0x7f0000001300)={&(0x7f0000001040)={0x2c, r3, 0x115, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x2c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00'}) ioctl$NBD_DO_IT(r1, 0xab03) (async) write$cgroup_subtree(r0, 0x0, 0x13) 19:04:10 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_CREATE_VM(r2, 0x401c5820, 0x0) 19:04:10 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae004", 0xad, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:10 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xc020660b, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) [ 272.456612][T20854] debugfs: out of free dentries, can not create directory '20854-5' 19:04:10 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$KVM_CREATE_VM(r2, 0x4020940d, 0x0) 19:04:11 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 39) 19:04:11 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) ioctl$KVM_CREATE_VM(r2, 0x4020940d, 0x0) 19:04:11 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_CREATE_VM(r2, 0x401c5820, 0x0) 19:04:11 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x11d900, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000a00)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000001340)={&(0x7f0000000d40), 0xff4e, &(0x7f0000001300)={&(0x7f0000001040)={0x2c, r3, 0x115, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x2c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00'}) ioctl$NBD_DO_IT(r1, 0xab03) write$cgroup_subtree(r0, 0x0, 0x13) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x11d900, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) (async) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), 0xffffffffffffffff) (async) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000a00)={0x14}, 0x14}}, 0x0) (async) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000001340)={&(0x7f0000000d40), 0xff4e, &(0x7f0000001300)={&(0x7f0000001040)={0x2c, r3, 0x115, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x2c}}, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00'}) (async) ioctl$NBD_DO_IT(r1, 0xab03) (async) write$cgroup_subtree(r0, 0x0, 0x13) (async) 19:04:11 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) ioctl$KVM_CREATE_VM(r2, 0x4020940d, 0x0) 19:04:11 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x2) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:11 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$KVM_CREATE_VM(r2, 0x4020940d, 0x0) 19:04:11 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_CREATE_VM(r2, 0x4020940d, 0x0) 19:04:11 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_CREATE_VM(r2, 0x401c5820, 0x0) 19:04:11 executing program 4: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae004", 0xad, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:04:11 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x3) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:11 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x4) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) [ 272.843052][T20901] ================================================================== [ 272.851162][T20901] BUG: KASAN: vmalloc-out-of-bounds in __list_add_valid+0x93/0xb0 [ 272.859059][T20901] Read of size 8 at addr ffffc90006b7a348 by task syz-executor.4/20901 [ 272.867316][T20901] [ 272.869647][T20901] CPU: 1 PID: 20901 Comm: syz-executor.4 Not tainted 5.19.0-syzkaller-13930-g7ebfc85e2cd7 #0 [ 272.879811][T20901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 272.889883][T20901] Call Trace: [ 272.893175][T20901] [ 272.896136][T20901] dump_stack_lvl+0xcd/0x134 [ 272.900756][T20901] ? __list_add_valid+0x93/0xb0 [ 272.905631][T20901] print_report.cold+0x59/0x6e9 [ 272.910534][T20901] ? __list_add_valid+0x93/0xb0 [ 272.915400][T20901] kasan_report+0xb1/0x1e0 [ 272.919834][T20901] ? __list_add_valid+0x93/0xb0 [ 272.924700][T20901] __list_add_valid+0x93/0xb0 [ 272.929402][T20901] kvm_dev_ioctl+0xf44/0x1ce0 [ 272.934108][T20901] ? kvm_stat_data_open+0x380/0x380 [ 272.939338][T20901] ? selinux_file_ioctl+0xb1/0x270 [ 272.944471][T20901] ? kvm_stat_data_open+0x380/0x380 [ 272.949698][T20901] __x64_sys_ioctl+0x193/0x200 [ 272.954497][T20901] do_syscall_64+0x35/0xb0 [ 272.958938][T20901] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 272.964854][T20901] RIP: 0033:0x7fb1fba89279 [ 272.969285][T20901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 272.988914][T20901] RSP: 002b:00007fb1fcc1e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 272.997354][T20901] RAX: ffffffffffffffda RBX: 00007fb1fbb9bf80 RCX: 00007fb1fba89279 [ 273.005346][T20901] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000004 [ 273.013423][T20901] RBP: 00007fb1fbae3189 R08: 0000000000000000 R09: 0000000000000000 [ 273.021409][T20901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 273.029394][T20901] R13: 00007ffea48aadbf R14: 00007fb1fcc1e300 R15: 0000000000022000 [ 273.037387][T20901] [ 273.040423][T20901] [ 273.042753][T20901] Memory state around the buggy address: [ 273.048387][T20901] ffffc90006b7a200: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 273.056551][T20901] ffffc90006b7a280: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 273.064623][T20901] >ffffc90006b7a300: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 273.072693][T20901] ^ [ 273.079121][T20901] ffffc90006b7a380: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 19:04:11 executing program 1: sendto$phonet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000400)=""/4096) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x60}}, 0x4000040) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 40) 19:04:11 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0x4020940d, 0x0) 19:04:11 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x1101, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x48800}, 0x24040014) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r3, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x5) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 19:04:11 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'rlimit'}, {0x2d, 'perf_event'}, {0x2b, 'cpuset'}]}, 0x1c) sendto$phonet(r0, &(0x7f0000000080)="2a99f4c0b72576b86506c7645d549ac1791b94066186428d8c3d88be86a856103c69d064d1bc2cab0f8a11581d00df88e635c68dd79d1316fe3648b62ae669ac72bd342917516f8d0272fc076cdcaece854747dbb3690db4ba301fd7dbdd9260756c38955dc6ed38dcbd573998d1a5de517bfb5bf020c14a81e4bc3aac976aaf6269c61d250a44fb0fc2f17bf699e3d6c22fda71d94b69bc0336bab0f7c6bf5314cce79980c778edf33f5ae00421", 0xae, 0x800, &(0x7f0000000140)={0x23, 0x3, 0xb3, 0xf7}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x40c83, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0x401c5820, 0x0) 19:04:11 executing program 3: r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000001400), 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x60, r0, 0x0, 0x0, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x84, r0, 0x0, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'gretap0\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @rand_addr=' \x01\x00'}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x84}}, 0x20004810) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x40002, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000340)={'syztnl2\x00', &(0x7f00000002c0)={'ip6gre0\x00', 0x0, 0x2f, 0x5, 0x5, 0x9, 0x15, @private2, @local, 0x20, 0x20, 0x3, 0x6}}) recvfrom$packet(r2, &(0x7f0000000240)=""/68, 0x44, 0x12102, &(0x7f0000000380)={0x11, 0x5, r3, 0x1, 0x7, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x24}}, 0x14) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x602001, 0x0) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000680)={'batadv_slave_0\x00'}) ioctl$NBD_CLEAR_SOCK(r4, 0xab04) [ 273.087195][T20901] ffffc90006b7a400: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 273.095350][T20901] ================================================================== [ 273.138115][ T27] audit: type=1400 audit(1660676651.574:129): avc: denied { write } for pid=20913 comm="syz-executor.3" name="btrfs-control" dev="devtmpfs" ino=1116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:lvm_control_t tclass=chr_file permissive=1 [ 273.162282][T20901] Kernel panic - not syncing: panic_on_warn set ... [ 273.162297][T20901] CPU: 1 PID: 20901 Comm: syz-executor.4 Not tainted 5.19.0-syzkaller-13930-g7ebfc85e2cd7 #0 [ 273.162323][T20901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 273.162335][T20901] Call Trace: [ 273.162340][T20901] [ 273.162347][T20901] dump_stack_lvl+0xcd/0x134 [ 273.162378][T20901] panic+0x2c8/0x627 [ 273.162431][T20901] ? panic_print_sys_info.part.0+0x10b/0x10b [ 273.162457][T20901] ? preempt_schedule_common+0x59/0xc0 [ 273.162483][T20901] ? preempt_schedule_thunk+0x16/0x18 [ 273.220799][T20901] ? __list_add_valid+0x93/0xb0 [ 273.225678][T20901] end_report.part.0+0x3f/0x7c [ 273.230474][T20901] kasan_report.cold+0xa/0xf [ 273.235092][T20901] ? __list_add_valid+0x93/0xb0 [ 273.239954][T20901] __list_add_valid+0x93/0xb0 [ 273.244629][T20901] kvm_dev_ioctl+0xf44/0x1ce0 [ 273.249341][T20901] ? kvm_stat_data_open+0x380/0x380 [ 273.254573][T20901] ? selinux_file_ioctl+0xb1/0x270 [ 273.259697][T20901] ? kvm_stat_data_open+0x380/0x380 [ 273.264959][T20901] __x64_sys_ioctl+0x193/0x200 [ 273.269738][T20901] do_syscall_64+0x35/0xb0 [ 273.274164][T20901] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 273.280070][T20901] RIP: 0033:0x7fb1fba89279 [ 273.284490][T20901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 273.304113][T20901] RSP: 002b:00007fb1fcc1e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 273.312568][T20901] RAX: ffffffffffffffda RBX: 00007fb1fbb9bf80 RCX: 00007fb1fba89279 [ 273.320554][T20901] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000004 [ 273.328530][T20901] RBP: 00007fb1fbae3189 R08: 0000000000000000 R09: 0000000000000000 [ 273.336525][T20901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 273.344506][T20901] R13: 00007ffea48aadbf R14: 00007fb1fcc1e300 R15: 0000000000022000 [ 273.352490][T20901] [ 273.355572][T20901] Kernel Offset: disabled [ 273.359891][T20901] Rebooting in 86400 seconds..