00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001100)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001140)={'syzkaller0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001240)={@mcast2}, &(0x7f0000001280)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000012c0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001300)={0x0, @rand_addr, @dev}, &(0x7f0000001340)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000015c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001b40)={&(0x7f0000000400), 0xc, &(0x7f0000001b00)={&(0x7f0000001600)={0x14}, 0x14}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@local, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @broadcast}}}, &(0x7f0000000640)=0x90) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000540)=0x8) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000040)) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000380)={@multicast2}, &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000be80)={{{@in=@remote, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f000000bf80)=0xe8) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:38:46 executing program 3: clock_settime(0xfffffffffffffffd, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}, 0xfffffffffffffe4f) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000240)) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0xfffffffffffffe89) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800"}) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[]}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[]}}, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, &(0x7f0000000580)=@pppol2tpin6, 0xffffffffffffff28) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0xfffffd84, 0xfffffffffffffffe) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000001280), 0x0, 0x0, 0xfffffffffffffffc) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) timerfd_create(0x0, 0x0) 03:38:46 executing program 2: getpgid(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='/proc/self/net/pfkey\x00'}, 0xfffffffffffffda8) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240), &(0x7f00000003c0)=0xffffffe7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000600)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getresuid(&(0x7f0000003280), &(0x7f0000000780), &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) getuid() stat(&(0x7f0000001a80)='./file0\x00', &(0x7f0000003b40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b40)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000001c40)=0xe8) getresgid(&(0x7f0000001c80), &(0x7f0000001cc0), &(0x7f0000001d00)) stat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)) getgid() getresuid(&(0x7f0000002580), &(0x7f00000025c0), &(0x7f0000002600)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002640)={{{@in6, @in=@local}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000002740)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002780)) fstat(0xffffffffffffffff, &(0x7f0000002800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f00000028c0)=0xc) stat(&(0x7f0000002900)='./file0\x00', &(0x7f0000003bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000029c0), &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000002b40)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@ipv4, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000002c80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002cc0)) openat$tun(0xffffffffffffff9c, &(0x7f0000003380)='/dev/net/tun\x00', 0x0, 0x0) geteuid() 03:38:46 executing program 5: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:46 executing program 1: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/kvm\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000400)='net/udp\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000c00)='/dev/vcs#\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/hwrng\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/vga_arbiter\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000f80)) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x113, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000200)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000300)=0x8) syz_open_procfs(0x0, &(0x7f00000001c0)='net/udplite\x00') ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000004ec0)) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000780)) read$eventfd(0xffffffffffffffff, &(0x7f0000001000), 0x8) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@multicast2, @dev}, &(0x7f0000000840)=0xc) accept(0xffffffffffffffff, &(0x7f0000000880)=@can, &(0x7f0000000900)=0x80) 03:38:46 executing program 0: inotify_init1(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$packet(0x11, 0x0, 0x300) dup(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6, @in6=@local}}, {{@in6=@remote}}}, &(0x7f00000002c0)=0xe8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) geteuid() getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@local, @in=@local}}, {{@in6=@remote}}}, &(0x7f00000007c0)=0xe8) getgroups(0x0, &(0x7f0000000800)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) getuid() setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in=@loopback, @in=@remote}}, {{@in6=@loopback}, 0x0, @in=@remote}}, 0xe8) getgroups(0x0, &(0x7f0000000880)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000180)=@proc, 0xc, &(0x7f0000000480), 0x0, &(0x7f00000008c0)=ANY=[]}, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) request_key(&(0x7f0000000300)='syzkaller\x00', &(0x7f0000000340), &(0x7f0000000380)='*)nodevuser\x00', 0xfffffffffffffffb) keyctl$get_security(0x11, 0x0, &(0x7f0000000c80)=""/241, 0xf1) set_tid_address(&(0x7f00000004c0)) chroot(&(0x7f00000003c0)='./file0\x00') perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) 03:38:47 executing program 4: shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000300)) fcntl$getown(0xffffffffffffffff, 0x9) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(0x0) keyctl$setperm(0xa, 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:38:47 executing program 2: getpgid(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='/proc/self/net/pfkey\x00'}, 0xfffffffffffffda8) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240), &(0x7f00000003c0)=0xffffffe7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000600)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getresuid(&(0x7f0000003280), &(0x7f0000000780), &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) getuid() stat(&(0x7f0000001a80)='./file0\x00', &(0x7f0000003b40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b40)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000001c40)=0xe8) getresgid(&(0x7f0000001c80), &(0x7f0000001cc0), &(0x7f0000001d00)) stat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)) getgid() getresuid(&(0x7f0000002580), &(0x7f00000025c0), &(0x7f0000002600)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002640)={{{@in6, @in=@local}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000002740)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002780)) fstat(0xffffffffffffffff, &(0x7f0000002800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f00000028c0)=0xc) stat(&(0x7f0000002900)='./file0\x00', &(0x7f0000003bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000029c0), &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000002b40)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@ipv4, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000002c80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002cc0)) openat$tun(0xffffffffffffff9c, &(0x7f0000003380)='/dev/net/tun\x00', 0x0, 0x0) geteuid() 03:38:47 executing program 3: clock_settime(0xfffffffffffffffd, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}, 0xfffffffffffffe4f) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000240)) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0xfffffffffffffe89) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800"}) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[]}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[]}}, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, &(0x7f0000000580)=@pppol2tpin6, 0xffffffffffffff28) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0xfffffd84, 0xfffffffffffffffe) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000001280), 0x0, 0x0, 0xfffffffffffffffc) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) timerfd_create(0x0, 0x0) 03:38:47 executing program 5: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:47 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000940)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000040)='eth1trustedppp0vboxnet1vboxnet0\x00'}, 0x30) getpgid(0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x0, 0x0) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f00000005c0)=0x10) fstat(0xffffffffffffffff, &(0x7f0000000340)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000800)=0xe8) getgid() syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:38:47 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$inet(0x2, 0x801, 0x0) getsockopt$inet_mtu(r1, 0x0, 0x9, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 03:38:47 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$inet(0x2, 0x801, 0x0) getsockopt$inet_mtu(r1, 0x0, 0x9, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 03:38:48 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$inet(0x2, 0x801, 0x0) getsockopt$inet_mtu(r1, 0x0, 0x9, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 03:38:48 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$inet(0x2, 0x801, 0x0) getsockopt$inet_mtu(r1, 0x0, 0x9, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 03:38:48 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x68}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:38:48 executing program 2: getpgid(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='/proc/self/net/pfkey\x00'}, 0xfffffffffffffda8) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240), &(0x7f00000003c0)=0xffffffe7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000600)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getresuid(&(0x7f0000003280), &(0x7f0000000780), &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) getuid() stat(&(0x7f0000001a80)='./file0\x00', &(0x7f0000003b40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b40)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000001c40)=0xe8) getresgid(&(0x7f0000001c80), &(0x7f0000001cc0), &(0x7f0000001d00)) stat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)) getgid() getresuid(&(0x7f0000002580), &(0x7f00000025c0), &(0x7f0000002600)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002640)={{{@in6, @in=@local}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000002740)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002780)) fstat(0xffffffffffffffff, &(0x7f0000002800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f00000028c0)=0xc) stat(&(0x7f0000002900)='./file0\x00', &(0x7f0000003bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000029c0), &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000002b40)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@ipv4, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000002c80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002cc0)) openat$tun(0xffffffffffffff9c, &(0x7f0000003380)='/dev/net/tun\x00', 0x0, 0x0) geteuid() 03:38:48 executing program 4: shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000300)) fcntl$getown(0xffffffffffffffff, 0x9) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(0x0) keyctl$setperm(0xa, 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:38:48 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x68}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:38:48 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x68}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:38:48 executing program 5: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x5, 0x8, 0x7ff, 0x7fff}, 0x2c) 03:38:49 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000940)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000040)='eth1trustedppp0vboxnet1vboxnet0\x00'}, 0x30) getpgid(0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x0, 0x0) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f00000005c0)=0x10) fstat(0xffffffffffffffff, &(0x7f0000000340)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000800)=0xe8) getgid() syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:38:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x5, 0x8, 0x7ff, 0x7fff}, 0x2c) 03:38:49 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x68}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:38:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x5, 0x8, 0x7ff, 0x7fff}, 0x2c) 03:38:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) syncfs(r0) 03:38:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x5, 0x8, 0x7ff, 0x7fff}, 0x2c) 03:38:49 executing program 2: getpgid(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='/proc/self/net/pfkey\x00'}, 0xfffffffffffffda8) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240), &(0x7f00000003c0)=0xffffffe7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000600)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getresuid(&(0x7f0000003280), &(0x7f0000000780), &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) getuid() stat(&(0x7f0000001a80)='./file0\x00', &(0x7f0000003b40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b40)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000001c40)=0xe8) getresgid(&(0x7f0000001c80), &(0x7f0000001cc0), &(0x7f0000001d00)) stat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)) getgid() getresuid(&(0x7f0000002580), &(0x7f00000025c0), &(0x7f0000002600)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002640)={{{@in6, @in=@local}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000002740)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002780)) fstat(0xffffffffffffffff, &(0x7f0000002800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f00000028c0)=0xc) stat(&(0x7f0000002900)='./file0\x00', &(0x7f0000003bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000029c0), &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000002b40)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@ipv4, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000002c80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002cc0)) openat$tun(0xffffffffffffff9c, &(0x7f0000003380)='/dev/net/tun\x00', 0x0, 0x0) geteuid() 03:38:49 executing program 4: shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000300)) fcntl$getown(0xffffffffffffffff, 0x9) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(0x0) keyctl$setperm(0xa, 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:38:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) syncfs(r0) 03:38:49 executing program 3: clock_gettime(0x0, &(0x7f0000000300)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005000), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000400)) pipe(&(0x7f0000000080)) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x244) dup(0xffffffffffffffff) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000180)='\x00', 0xfffffffffffffffa) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200), &(0x7f0000000280)='notify_on_release\x00', 0x0) keyctl$unlink(0x9, 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000900)=0xe8) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a40)) getresgid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b80)) getuid() getgid() getpid() stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) getgroups(0x0, &(0x7f0000000cc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000d40)=0xe8) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f00)={{{@in=@remote, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000001000)=0xe8) lstat(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001200)=0xe8) getgroups(0x0, &(0x7f0000001240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001300)={{{@in=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000001400)=0xe8) getresgid(&(0x7f0000001440), &(0x7f0000001480), &(0x7f00000014c0)) getpid() fstat(0xffffffffffffffff, &(0x7f00000015c0)) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:38:49 executing program 5: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) syncfs(r0) 03:38:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) syncfs(r0) 03:38:49 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000940)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000040)='eth1trustedppp0vboxnet1vboxnet0\x00'}, 0x30) getpgid(0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x0, 0x0) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f00000005c0)=0x10) fstat(0xffffffffffffffff, &(0x7f0000000340)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000800)=0xe8) getgid() syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:38:50 executing program 1: getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000680)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600), &(0x7f0000000300), 0xfffffffffffffe45, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getresgid(&(0x7f0000000d40), &(0x7f00000003c0), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) getresuid(&(0x7f0000001500), &(0x7f0000001540), &(0x7f0000001580)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f0000000540)) getuid() stat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002380)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000002480)=0xe8) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000024c0)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@loopback}}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='\x00', &(0x7f0000002640)) fstat(0xffffffffffffffff, &(0x7f0000002cc0)) fstat(0xffffffffffffffff, &(0x7f0000002d40)) getresgid(&(0x7f0000002dc0), &(0x7f0000002e00), &(0x7f0000002e40)) stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getgroups(0x0, &(0x7f0000002f40)) lstat(&(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)) getgroups(0x400000000000024e, &(0x7f00000003c0)) 03:38:50 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getpid() r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, r0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.procs\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 03:38:50 executing program 4: shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000300)) fcntl$getown(0xffffffffffffffff, 0x9) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(0x0) keyctl$setperm(0xa, 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:38:50 executing program 3: clock_gettime(0x0, &(0x7f0000000300)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005000), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000400)) pipe(&(0x7f0000000080)) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x244) dup(0xffffffffffffffff) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000180)='\x00', 0xfffffffffffffffa) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200), &(0x7f0000000280)='notify_on_release\x00', 0x0) keyctl$unlink(0x9, 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000900)=0xe8) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a40)) getresgid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b80)) getuid() getgid() getpid() stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) getgroups(0x0, &(0x7f0000000cc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000d40)=0xe8) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f00)={{{@in=@remote, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000001000)=0xe8) lstat(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001200)=0xe8) getgroups(0x0, &(0x7f0000001240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001300)={{{@in=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000001400)=0xe8) getresgid(&(0x7f0000001440), &(0x7f0000001480), &(0x7f00000014c0)) getpid() fstat(0xffffffffffffffff, &(0x7f00000015c0)) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:38:50 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000007000)={&(0x7f0000001000), 0xc, &(0x7f0000007ff0)={&(0x7f0000009000)=@newsa={0x140, 0x10, 0x301, 0x0, 0x0, {{@in=@broadcast, @in=@rand_addr}, {@in6=@loopback, 0x0, 0x32}, @in6, {}, {}, {}, 0x0, 0x0, 0x2, 0x1}, [@tfcpad={0x8}, @algo_auth={0x48, 0x1, {{'sha256\x00'}}}]}, 0x140}}, 0x0) 03:38:50 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000007000)={&(0x7f0000001000), 0xc, &(0x7f0000007ff0)={&(0x7f0000009000)=@newsa={0x140, 0x10, 0x301, 0x0, 0x0, {{@in=@broadcast, @in=@rand_addr}, {@in6=@loopback, 0x0, 0x32}, @in6, {}, {}, {}, 0x0, 0x0, 0x2, 0x1}, [@tfcpad={0x8}, @algo_auth={0x48, 0x1, {{'sha256\x00'}}}]}, 0x140}}, 0x0) 03:38:50 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getpid() r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, r0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.procs\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 03:38:50 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000940)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000040)='eth1trustedppp0vboxnet1vboxnet0\x00'}, 0x30) getpgid(0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x0, 0x0) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f00000005c0)=0x10) fstat(0xffffffffffffffff, &(0x7f0000000340)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000800)=0xe8) getgid() syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:38:50 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000007000)={&(0x7f0000001000), 0xc, &(0x7f0000007ff0)={&(0x7f0000009000)=@newsa={0x140, 0x10, 0x301, 0x0, 0x0, {{@in=@broadcast, @in=@rand_addr}, {@in6=@loopback, 0x0, 0x32}, @in6, {}, {}, {}, 0x0, 0x0, 0x2, 0x1}, [@tfcpad={0x8}, @algo_auth={0x48, 0x1, {{'sha256\x00'}}}]}, 0x140}}, 0x0) 03:38:50 executing program 1: getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000680)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600), &(0x7f0000000300), 0xfffffffffffffe45, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getresgid(&(0x7f0000000d40), &(0x7f00000003c0), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) getresuid(&(0x7f0000001500), &(0x7f0000001540), &(0x7f0000001580)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f0000000540)) getuid() stat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002380)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000002480)=0xe8) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000024c0)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@loopback}}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='\x00', &(0x7f0000002640)) fstat(0xffffffffffffffff, &(0x7f0000002cc0)) fstat(0xffffffffffffffff, &(0x7f0000002d40)) getresgid(&(0x7f0000002dc0), &(0x7f0000002e00), &(0x7f0000002e40)) stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getgroups(0x0, &(0x7f0000002f40)) lstat(&(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)) getgroups(0x400000000000024e, &(0x7f00000003c0)) 03:38:51 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000007000)={&(0x7f0000001000), 0xc, &(0x7f0000007ff0)={&(0x7f0000009000)=@newsa={0x140, 0x10, 0x301, 0x0, 0x0, {{@in=@broadcast, @in=@rand_addr}, {@in6=@loopback, 0x0, 0x32}, @in6, {}, {}, {}, 0x0, 0x0, 0x2, 0x1}, [@tfcpad={0x8}, @algo_auth={0x48, 0x1, {{'sha256\x00'}}}]}, 0x140}}, 0x0) 03:38:51 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getpid() r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, r0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.procs\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 03:38:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={"66696c7465720200", 0x4}, 0x68) 03:38:51 executing program 4: clock_gettime(0xa2000000, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000300), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:38:51 executing program 3: clock_gettime(0x0, &(0x7f0000000300)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005000), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000400)) pipe(&(0x7f0000000080)) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x244) dup(0xffffffffffffffff) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000180)='\x00', 0xfffffffffffffffa) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200), &(0x7f0000000280)='notify_on_release\x00', 0x0) keyctl$unlink(0x9, 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000900)=0xe8) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a40)) getresgid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b80)) getuid() getgid() getpid() stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) getgroups(0x0, &(0x7f0000000cc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000d40)=0xe8) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f00)={{{@in=@remote, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000001000)=0xe8) lstat(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001200)=0xe8) getgroups(0x0, &(0x7f0000001240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001300)={{{@in=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000001400)=0xe8) getresgid(&(0x7f0000001440), &(0x7f0000001480), &(0x7f00000014c0)) getpid() fstat(0xffffffffffffffff, &(0x7f00000015c0)) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:38:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={"66696c7465720200", 0x4}, 0x68) 03:38:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={"66696c7465720200", 0x4}, 0x68) 03:38:51 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getpid() r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, r0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.procs\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 03:38:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={"66696c7465720200", 0x4}, 0x68) 03:38:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004c40)={&(0x7f0000000000), 0xc, &(0x7f0000004c00)={&(0x7f0000004bc0)=@mpls_getnetconf={0x14}, 0x14}}, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)) 03:38:51 executing program 1: getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000680)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600), &(0x7f0000000300), 0xfffffffffffffe45, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getresgid(&(0x7f0000000d40), &(0x7f00000003c0), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) getresuid(&(0x7f0000001500), &(0x7f0000001540), &(0x7f0000001580)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f0000000540)) getuid() stat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002380)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000002480)=0xe8) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000024c0)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@loopback}}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='\x00', &(0x7f0000002640)) fstat(0xffffffffffffffff, &(0x7f0000002cc0)) fstat(0xffffffffffffffff, &(0x7f0000002d40)) getresgid(&(0x7f0000002dc0), &(0x7f0000002e00), &(0x7f0000002e40)) stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getgroups(0x0, &(0x7f0000002f40)) lstat(&(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)) getgroups(0x400000000000024e, &(0x7f00000003c0)) 03:38:51 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2b, 0x400000000000801, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) poll(&(0x7f0000000180)=[{r1}], 0x50, 0x0) 03:38:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004c40)={&(0x7f0000000000), 0xc, &(0x7f0000004c00)={&(0x7f0000004bc0)=@mpls_getnetconf={0x14}, 0x14}}, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)) 03:38:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2b, 0x400000000000801, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) poll(&(0x7f0000000180)=[{r1}], 0x50, 0x0) 03:38:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004c40)={&(0x7f0000000000), 0xc, &(0x7f0000004c00)={&(0x7f0000004bc0)=@mpls_getnetconf={0x14}, 0x14}}, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)) 03:38:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004c40)={&(0x7f0000000000), 0xc, &(0x7f0000004c00)={&(0x7f0000004bc0)=@mpls_getnetconf={0x14}, 0x14}}, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)) 03:38:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2b, 0x400000000000801, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) poll(&(0x7f0000000180)=[{r1}], 0x50, 0x0) 03:38:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2b, 0x400000000000801, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) poll(&(0x7f0000000180)=[{r1}], 0x50, 0x0) 03:38:52 executing program 4: clock_gettime(0xa2000000, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000300), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:38:52 executing program 3: clock_gettime(0x0, &(0x7f0000000300)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005000), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000400)) pipe(&(0x7f0000000080)) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x244) dup(0xffffffffffffffff) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000180)='\x00', 0xfffffffffffffffa) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200), &(0x7f0000000280)='notify_on_release\x00', 0x0) keyctl$unlink(0x9, 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000900)=0xe8) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a40)) getresgid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b80)) getuid() getgid() getpid() stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) getgroups(0x0, &(0x7f0000000cc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000d40)=0xe8) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f00)={{{@in=@remote, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000001000)=0xe8) lstat(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001200)=0xe8) getgroups(0x0, &(0x7f0000001240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001300)={{{@in=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000001400)=0xe8) getresgid(&(0x7f0000001440), &(0x7f0000001480), &(0x7f00000014c0)) getpid() fstat(0xffffffffffffffff, &(0x7f00000015c0)) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:38:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2b, 0x400000000000801, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) poll(&(0x7f0000000180)=[{r1}], 0x50, 0x0) 03:38:52 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000380)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) lseek(r0, 0x0, 0x0) 03:38:52 executing program 1: getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000680)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600), &(0x7f0000000300), 0xfffffffffffffe45, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getresgid(&(0x7f0000000d40), &(0x7f00000003c0), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) getresuid(&(0x7f0000001500), &(0x7f0000001540), &(0x7f0000001580)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f0000000540)) getuid() stat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002380)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000002480)=0xe8) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000024c0)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@loopback}}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='\x00', &(0x7f0000002640)) fstat(0xffffffffffffffff, &(0x7f0000002cc0)) fstat(0xffffffffffffffff, &(0x7f0000002d40)) getresgid(&(0x7f0000002dc0), &(0x7f0000002e00), &(0x7f0000002e40)) stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getgroups(0x0, &(0x7f0000002f40)) lstat(&(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)) getgroups(0x400000000000024e, &(0x7f00000003c0)) 03:38:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2b, 0x400000000000801, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) poll(&(0x7f0000000180)=[{r1}], 0x50, 0x0) 03:38:52 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000380)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) lseek(r0, 0x0, 0x0) 03:38:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=@bridge_setlink={0x20, 0x13, 0x129}, 0x20}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:38:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=@bridge_setlink={0x20, 0x13, 0x129}, 0x20}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:38:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2b, 0x400000000000801, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) poll(&(0x7f0000000180)=[{r1}], 0x50, 0x0) 03:38:52 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000380)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) lseek(r0, 0x0, 0x0) 03:38:53 executing program 4: clock_gettime(0xa2000000, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000300), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:38:53 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=@bridge_setlink={0x20, 0x13, 0x129}, 0x20}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:38:53 executing program 1: nanosleep(&(0x7f0000000440), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000280)) gettid() socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@rand_addr, @in=@dev}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000f80)=0x306) getgroups(0x0, &(0x7f0000000140)) getgroups(0x0, &(0x7f00000003c0)) geteuid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b80)) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) memfd_create(&(0x7f0000000380)='\x00', 0x0) memfd_create(&(0x7f0000000080)='user\x00', 0x0) rt_sigprocmask(0x0, &(0x7f0000000400), 0x0, 0x8) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @local, 0x0, 0x0, 'sed\x00'}, 0x2ac) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) syz_execute_func(&(0x7f0000000200)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:53 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000380)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) lseek(r0, 0x0, 0x0) 03:38:53 executing program 2: unshare(0x2000400) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 03:38:53 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=@bridge_setlink={0x20, 0x13, 0x129}, 0x20}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:38:53 executing program 3: getitimer(0x0, &(0x7f0000000240)) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28}, 0x28) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") 03:38:53 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f000075cf53), &(0x7f000015dffc), &(0x7f0000b25ffc), &(0x7f0000923000)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000003ff8), 0xa0000004, 0x0) r1 = socket(0x5, 0x80000, 0xe81) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000001c0), &(0x7f0000000040)=0x165) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='yam0\x00', r0}, 0x10) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$KDGKBMETA(r2, 0x4b62, 0xfffffffffffffffd) connect$bt_sco(r1, &(0x7f0000000180)={0x1f, {0x26, 0x3, 0x4, 0xfffffffffffffffe, 0x80, 0x6}}, 0x8) ioctl$KVM_ASSIGN_SET_INTX_MASK(r2, 0x4040aea4, &(0x7f0000000000)={0xffffffffffffffff, 0x10000, 0x6b44000000000, 0x5, 0x486cda05}) 03:38:53 executing program 5: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/122) getpid() fcntl$getown(0xffffffffffffff9c, 0x9) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000b80)='cgroup.subtree_control\x00', 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/ptmx\x00', 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000006c0)='trusted.overlay.origin\x00', &(0x7f00000007c0)='y\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000400)={&(0x7f0000000c80)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000c00)) syz_execute_func(&(0x7f0000001d40)="428055a0866969ef69dc00d93e3e3e660f381ecaa71837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000340)) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000300)=0xe8) memfd_create(&(0x7f0000000000)='trustedN,bdev&vmnet1\x00', 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) 03:38:53 executing program 2: unshare(0x2000400) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 03:38:54 executing program 1: nanosleep(&(0x7f0000000440), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000280)) gettid() socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@rand_addr, @in=@dev}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000f80)=0x306) getgroups(0x0, &(0x7f0000000140)) getgroups(0x0, &(0x7f00000003c0)) geteuid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b80)) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) memfd_create(&(0x7f0000000380)='\x00', 0x0) memfd_create(&(0x7f0000000080)='user\x00', 0x0) rt_sigprocmask(0x0, &(0x7f0000000400), 0x0, 0x8) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @local, 0x0, 0x0, 'sed\x00'}, 0x2ac) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) syz_execute_func(&(0x7f0000000200)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:54 executing program 2: unshare(0x2000400) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 03:38:54 executing program 4: clock_gettime(0xa2000000, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000300), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:38:54 executing program 2: unshare(0x2000400) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 03:38:54 executing program 1: nanosleep(&(0x7f0000000440), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000280)) gettid() socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@rand_addr, @in=@dev}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000f80)=0x306) getgroups(0x0, &(0x7f0000000140)) getgroups(0x0, &(0x7f00000003c0)) geteuid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b80)) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) memfd_create(&(0x7f0000000380)='\x00', 0x0) memfd_create(&(0x7f0000000080)='user\x00', 0x0) rt_sigprocmask(0x0, &(0x7f0000000400), 0x0, 0x8) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @local, 0x0, 0x0, 'sed\x00'}, 0x2ac) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) syz_execute_func(&(0x7f0000000200)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 1141.548189] cgroup: fork rejected by pids controller in /syz0 03:38:54 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f000075cf53), &(0x7f000015dffc), &(0x7f0000b25ffc), &(0x7f0000923000)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000003ff8), 0xa0000004, 0x0) r1 = socket(0x5, 0x80000, 0xe81) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000001c0), &(0x7f0000000040)=0x165) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='yam0\x00', r0}, 0x10) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$KDGKBMETA(r2, 0x4b62, 0xfffffffffffffffd) connect$bt_sco(r1, &(0x7f0000000180)={0x1f, {0x26, 0x3, 0x4, 0xfffffffffffffffe, 0x80, 0x6}}, 0x8) ioctl$KVM_ASSIGN_SET_INTX_MASK(r2, 0x4040aea4, &(0x7f0000000000)={0xffffffffffffffff, 0x10000, 0x6b44000000000, 0x5, 0x486cda05}) 03:38:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x10200, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000100)={0x7, 0x6d, 0x1}, 0x7) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000740), &(0x7f0000000780)=0x8) sendfile(r1, r1, &(0x7f0000000040)=0xffd, 0x10a000000) 03:38:54 executing program 1: nanosleep(&(0x7f0000000440), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000280)) gettid() socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@rand_addr, @in=@dev}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000f80)=0x306) getgroups(0x0, &(0x7f0000000140)) getgroups(0x0, &(0x7f00000003c0)) geteuid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b80)) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) memfd_create(&(0x7f0000000380)='\x00', 0x0) memfd_create(&(0x7f0000000080)='user\x00', 0x0) rt_sigprocmask(0x0, &(0x7f0000000400), 0x0, 0x8) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @local, 0x0, 0x0, 'sed\x00'}, 0x2ac) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) syz_execute_func(&(0x7f0000000200)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:54 executing program 3: getitimer(0x0, &(0x7f0000000240)) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28}, 0x28) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") 03:38:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x10200, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000100)={0x7, 0x6d, 0x1}, 0x7) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000740), &(0x7f0000000780)=0x8) sendfile(r1, r1, &(0x7f0000000040)=0xffd, 0x10a000000) 03:38:54 executing program 5: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/122) getpid() fcntl$getown(0xffffffffffffff9c, 0x9) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000b80)='cgroup.subtree_control\x00', 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/ptmx\x00', 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000006c0)='trusted.overlay.origin\x00', &(0x7f00000007c0)='y\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000400)={&(0x7f0000000c80)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000c00)) syz_execute_func(&(0x7f0000001d40)="428055a0866969ef69dc00d93e3e3e660f381ecaa71837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000340)) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000300)=0xe8) memfd_create(&(0x7f0000000000)='trustedN,bdev&vmnet1\x00', 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) 03:38:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0xc05c5340, &(0x7f0000030fb4)) 03:38:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x10200, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000100)={0x7, 0x6d, 0x1}, 0x7) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000740), &(0x7f0000000780)=0x8) sendfile(r1, r1, &(0x7f0000000040)=0xffd, 0x10a000000) 03:38:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f000075cf53), &(0x7f000015dffc), &(0x7f0000b25ffc), &(0x7f0000923000)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000003ff8), 0xa0000004, 0x0) r1 = socket(0x5, 0x80000, 0xe81) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000001c0), &(0x7f0000000040)=0x165) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='yam0\x00', r0}, 0x10) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$KDGKBMETA(r2, 0x4b62, 0xfffffffffffffffd) connect$bt_sco(r1, &(0x7f0000000180)={0x1f, {0x26, 0x3, 0x4, 0xfffffffffffffffe, 0x80, 0x6}}, 0x8) ioctl$KVM_ASSIGN_SET_INTX_MASK(r2, 0x4040aea4, &(0x7f0000000000)={0xffffffffffffffff, 0x10000, 0x6b44000000000, 0x5, 0x486cda05}) 03:38:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x10200, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000100)={0x7, 0x6d, 0x1}, 0x7) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000740), &(0x7f0000000780)=0x8) sendfile(r1, r1, &(0x7f0000000040)=0xffd, 0x10a000000) 03:38:55 executing program 4: unshare(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000002c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) capset(&(0x7f0000000140), &(0x7f0000000180)) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname(0xffffffffffffffff, &(0x7f0000002100)=@hci, &(0x7f0000002180)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f14157a9e3e643e66f26fe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0xc05c5340, &(0x7f0000030fb4)) 03:38:55 executing program 2: clock_getres(0x19bbfd0afe09e2a, &(0x7f00000001c0)) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:38:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0xc05c5340, &(0x7f0000030fb4)) 03:38:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f000075cf53), &(0x7f000015dffc), &(0x7f0000b25ffc), &(0x7f0000923000)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000003ff8), 0xa0000004, 0x0) r1 = socket(0x5, 0x80000, 0xe81) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000001c0), &(0x7f0000000040)=0x165) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='yam0\x00', r0}, 0x10) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$KDGKBMETA(r2, 0x4b62, 0xfffffffffffffffd) connect$bt_sco(r1, &(0x7f0000000180)={0x1f, {0x26, 0x3, 0x4, 0xfffffffffffffffe, 0x80, 0x6}}, 0x8) ioctl$KVM_ASSIGN_SET_INTX_MASK(r2, 0x4040aea4, &(0x7f0000000000)={0xffffffffffffffff, 0x10000, 0x6b44000000000, 0x5, 0x486cda05}) 03:38:55 executing program 3: getitimer(0x0, &(0x7f0000000240)) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28}, 0x28) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") 03:38:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0xc05c5340, &(0x7f0000030fb4)) 03:38:55 executing program 5: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/122) getpid() fcntl$getown(0xffffffffffffff9c, 0x9) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000b80)='cgroup.subtree_control\x00', 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/ptmx\x00', 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000006c0)='trusted.overlay.origin\x00', &(0x7f00000007c0)='y\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000400)={&(0x7f0000000c80)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000c00)) syz_execute_func(&(0x7f0000001d40)="428055a0866969ef69dc00d93e3e3e660f381ecaa71837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000340)) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000300)=0xe8) memfd_create(&(0x7f0000000000)='trustedN,bdev&vmnet1\x00', 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) 03:38:55 executing program 0: syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000000200)='noacl') 03:38:55 executing program 1: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getgroups(0x0, &(0x7f0000001200)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000001240), 0x24, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:55 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) fanotify_init(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) 03:38:56 executing program 4: unshare(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000002c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) capset(&(0x7f0000000140), &(0x7f0000000180)) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname(0xffffffffffffffff, &(0x7f0000002100)=@hci, &(0x7f0000002180)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f14157a9e3e643e66f26fe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:56 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) fanotify_init(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) 03:38:56 executing program 2: clock_getres(0x19bbfd0afe09e2a, &(0x7f00000001c0)) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:38:56 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) fanotify_init(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) 03:38:56 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) fanotify_init(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) 03:38:56 executing program 0: pipe2(&(0x7f0000000580), 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000005c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000640)) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f00000000c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000240)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000440), &(0x7f00000001c0)=0x6) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast, @rand_addr, @loopback}, &(0x7f0000000200)=0xc) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000540)) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000007c0)) getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fremovexattr(0xffffffffffffffff, &(0x7f0000000140)=@known='security.SMACK64IPOUT\x00') syz_execute_func(&(0x7f00000003c0)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298c422ed7992749f55") 03:38:56 executing program 3: getitimer(0x0, &(0x7f0000000240)) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28}, 0x28) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") 03:38:56 executing program 1: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getgroups(0x0, &(0x7f0000001200)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000001240), 0x24, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:56 executing program 5: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/122) getpid() fcntl$getown(0xffffffffffffff9c, 0x9) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000b80)='cgroup.subtree_control\x00', 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/ptmx\x00', 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000006c0)='trusted.overlay.origin\x00', &(0x7f00000007c0)='y\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000400)={&(0x7f0000000c80)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000c00)) syz_execute_func(&(0x7f0000001d40)="428055a0866969ef69dc00d93e3e3e660f381ecaa71837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000340)) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000300)=0xe8) memfd_create(&(0x7f0000000000)='trustedN,bdev&vmnet1\x00', 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) 03:38:57 executing program 4: unshare(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000002c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) capset(&(0x7f0000000140), &(0x7f0000000180)) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname(0xffffffffffffffff, &(0x7f0000002100)=@hci, &(0x7f0000002180)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f14157a9e3e643e66f26fe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:57 executing program 2: clock_getres(0x19bbfd0afe09e2a, &(0x7f00000001c0)) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:38:57 executing program 3: keyctl$setperm(0x15, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0), 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) ftruncate(0xffffffffffffffff, 0x0) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0xfffffffffffffee4) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @multicast1}}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0xe8) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000a40)) getegid() getegid() fstat(0xffffffffffffffff, &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f0000000640)) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000840)=ANY=[], 0x0) 03:38:57 executing program 0: pipe2(&(0x7f0000000580), 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000005c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000640)) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f00000000c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000240)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000440), &(0x7f00000001c0)=0x6) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast, @rand_addr, @loopback}, &(0x7f0000000200)=0xc) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000540)) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000007c0)) getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fremovexattr(0xffffffffffffffff, &(0x7f0000000140)=@known='security.SMACK64IPOUT\x00') syz_execute_func(&(0x7f00000003c0)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298c422ed7992749f55") 03:38:57 executing program 1: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getgroups(0x0, &(0x7f0000001200)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000001240), 0x24, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:57 executing program 5: ioprio_set$uid(0x3, 0x0, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) prctl$setname(0x25, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x26, &(0x7f00000000c0)='vmnet0md5sum@,cgroup@wlan1@#*^wlan1lo\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000700)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)=ANY=[], &(0x7f0000000480)) dup(0xffffffffffffffff) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "c3c7f00418be0017d8aa1a1c1d646d2879707a57d32ce49dd0e10c79808086c5"}) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@dev, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) syz_open_dev$sndpcmp(&(0x7f0000000600)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000640)=""/156) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), 0xc) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) geteuid() ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') 03:38:58 executing program 4: unshare(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000002c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) capset(&(0x7f0000000140), &(0x7f0000000180)) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname(0xffffffffffffffff, &(0x7f0000002100)=@hci, &(0x7f0000002180)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f14157a9e3e643e66f26fe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:58 executing program 2: clock_getres(0x19bbfd0afe09e2a, &(0x7f00000001c0)) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:38:58 executing program 3: keyctl$setperm(0x15, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0), 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) ftruncate(0xffffffffffffffff, 0x0) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0xfffffffffffffee4) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @multicast1}}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0xe8) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000a40)) getegid() getegid() fstat(0xffffffffffffffff, &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f0000000640)) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000840)=ANY=[], 0x0) 03:38:58 executing program 0: pipe2(&(0x7f0000000580), 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000005c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000640)) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f00000000c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000240)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000440), &(0x7f00000001c0)=0x6) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast, @rand_addr, @loopback}, &(0x7f0000000200)=0xc) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000540)) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000007c0)) getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fremovexattr(0xffffffffffffffff, &(0x7f0000000140)=@known='security.SMACK64IPOUT\x00') syz_execute_func(&(0x7f00000003c0)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298c422ed7992749f55") 03:38:58 executing program 1: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getgroups(0x0, &(0x7f0000001200)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000001240), 0x24, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:58 executing program 4: mount$9p_xen(&(0x7f0000000480)='bond0\x00', &(0x7f0000000900)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x0, &(0x7f0000000580)={'trans=xen,'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'bond0\x00'}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6, @in6=@mcast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000280)={0x20}, 0x20) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000940)) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200), 0x4) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000a80)={'nat\x00'}, &(0x7f0000000540)=0x54) open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f00000002c0)={{0x2, 0x0, @rand_addr}, {0x0, @random="419205671896"}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6gre0\x00'}) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0xffffffffffffff8d) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xfd74) getuid() ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000c80)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f00000004c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000680)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)) 03:38:59 executing program 2: semget$private(0xffffff7f, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f00000002c0)=""/138) keyctl$set_reqkey_keyring(0xe, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getgroups(0x0, &(0x7f0000000840)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000980)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000009c0)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000dc0)=0xe8) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000ec0)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getegid() getpid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004780), &(0x7f00000047c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004800), &(0x7f0000004840)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004880)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000004980)=0xe8) getgroups(0x0, &(0x7f00000049c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a00), &(0x7f0000004a40)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004a80)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@rand_addr}}, &(0x7f0000004b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004bc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004c80)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000004c40)='/dev/autofs\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000004cc0), &(0x7f0000004d00), &(0x7f0000004d40)) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000004d80)) stat(&(0x7f0000004dc0)='./file0\x00', &(0x7f0000004e00)) lstat(&(0x7f0000004e80)='./file0\x00', &(0x7f0000004ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000085c0)) getuid() lstat(&(0x7f0000008600)='./file0\x00', &(0x7f0000008640)) getpgrp(0xffffffffffffffff) stat(&(0x7f00000086c0)='./file0\x00', &(0x7f0000008700)) lstat(&(0x7f0000008780)='./file0\x00', &(0x7f00000087c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008840)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000008940)=0xe8) lstat(&(0x7f0000008980)='./file0\x00', &(0x7f00000089c0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000008a40)) getresgid(&(0x7f0000008ac0), &(0x7f0000008b00), &(0x7f0000008b40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008b80)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000008c80)=0xe8) lstat(&(0x7f0000008cc0)='./file0\x00', &(0x7f0000008d00)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009440)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000009540)=0xe8) stat(&(0x7f0000009580)='./file0\x00', &(0x7f00000095c0)) syz_open_dev$loop(&(0x7f0000009640)='/dev/loop#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000096c0), &(0x7f0000009700)=0xc) stat(&(0x7f0000009740)='./file0\x00', &(0x7f0000009780)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009800)={{{@in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in=@local}}, &(0x7f0000009900)=0xe8) getgroups(0x0, &(0x7f0000009940)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000ae80)) geteuid() getgroups(0x0, &(0x7f000000aec0)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000000af00), &(0x7f000000af40)=0xc) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f000000c1c0)) fstat(0xffffffffffffffff, &(0x7f000000c200)) getgroups(0x0, &(0x7f000000c280)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000c840)={{{@in=@multicast2, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f000000c940)=0xe8) getegid() getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f000000c980)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f000000ca40), 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000200), 0xce, 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:59 executing program 5: ioprio_set$uid(0x3, 0x0, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) prctl$setname(0x25, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x26, &(0x7f00000000c0)='vmnet0md5sum@,cgroup@wlan1@#*^wlan1lo\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000700)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)=ANY=[], &(0x7f0000000480)) dup(0xffffffffffffffff) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "c3c7f00418be0017d8aa1a1c1d646d2879707a57d32ce49dd0e10c79808086c5"}) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@dev, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) syz_open_dev$sndpcmp(&(0x7f0000000600)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000640)=""/156) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), 0xc) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) geteuid() ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') 03:38:59 executing program 3: keyctl$setperm(0x15, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0), 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) ftruncate(0xffffffffffffffff, 0x0) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0xfffffffffffffee4) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @multicast1}}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0xe8) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000a40)) getegid() getegid() fstat(0xffffffffffffffff, &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f0000000640)) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000840)=ANY=[], 0x0) 03:38:59 executing program 0: pipe2(&(0x7f0000000580), 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000005c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000640)) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f00000000c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000240)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000440), &(0x7f00000001c0)=0x6) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast, @rand_addr, @loopback}, &(0x7f0000000200)=0xc) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000540)) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000007c0)) getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fremovexattr(0xffffffffffffffff, &(0x7f0000000140)=@known='security.SMACK64IPOUT\x00') syz_execute_func(&(0x7f00000003c0)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298c422ed7992749f55") 03:38:59 executing program 1: clone(0x1003ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000280)={@remote}, &(0x7f00000002c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @loopback}, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000bc0)={@multicast1, @local}, &(0x7f0000000c00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d00)={{{@in=@loopback, @in=@dev}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000e00)=0xfffffffffffffda0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x144c04}, 0xc, &(0x7f00000016c0)={&(0x7f00000011c0)={0xa0, r0, 0x2, 0x70bd26, 0x0, {}, [{{0x8, 0x1, r1}, {0x4}}, {{0x8, 0x1, r2}, {0x78, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}]}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) 03:38:59 executing program 1: clone(0x1003ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000280)={@remote}, &(0x7f00000002c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @loopback}, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000bc0)={@multicast1, @local}, &(0x7f0000000c00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d00)={{{@in=@loopback, @in=@dev}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000e00)=0xfffffffffffffda0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x144c04}, 0xc, &(0x7f00000016c0)={&(0x7f00000011c0)={0xa0, r0, 0x2, 0x70bd26, 0x0, {}, [{{0x8, 0x1, r1}, {0x4}}, {{0x8, 0x1, r2}, {0x78, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}]}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) 03:38:59 executing program 4: mount$9p_xen(&(0x7f0000000480)='bond0\x00', &(0x7f0000000900)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x0, &(0x7f0000000580)={'trans=xen,'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'bond0\x00'}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6, @in6=@mcast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000280)={0x20}, 0x20) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000940)) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200), 0x4) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000a80)={'nat\x00'}, &(0x7f0000000540)=0x54) open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f00000002c0)={{0x2, 0x0, @rand_addr}, {0x0, @random="419205671896"}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6gre0\x00'}) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0xffffffffffffff8d) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xfd74) getuid() ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000c80)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f00000004c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000680)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)) 03:38:59 executing program 5: ioprio_set$uid(0x3, 0x0, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) prctl$setname(0x25, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x26, &(0x7f00000000c0)='vmnet0md5sum@,cgroup@wlan1@#*^wlan1lo\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000700)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)=ANY=[], &(0x7f0000000480)) dup(0xffffffffffffffff) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "c3c7f00418be0017d8aa1a1c1d646d2879707a57d32ce49dd0e10c79808086c5"}) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@dev, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) syz_open_dev$sndpcmp(&(0x7f0000000600)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000640)=""/156) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), 0xc) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) geteuid() ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') 03:38:59 executing program 1: clone(0x1003ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000280)={@remote}, &(0x7f00000002c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @loopback}, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000bc0)={@multicast1, @local}, &(0x7f0000000c00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d00)={{{@in=@loopback, @in=@dev}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000e00)=0xfffffffffffffda0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x144c04}, 0xc, &(0x7f00000016c0)={&(0x7f00000011c0)={0xa0, r0, 0x2, 0x70bd26, 0x0, {}, [{{0x8, 0x1, r1}, {0x4}}, {{0x8, 0x1, r2}, {0x78, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}]}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) 03:39:00 executing program 2: semget$private(0xffffff7f, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f00000002c0)=""/138) keyctl$set_reqkey_keyring(0xe, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getgroups(0x0, &(0x7f0000000840)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000980)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000009c0)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000dc0)=0xe8) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000ec0)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getegid() getpid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004780), &(0x7f00000047c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004800), &(0x7f0000004840)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004880)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000004980)=0xe8) getgroups(0x0, &(0x7f00000049c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a00), &(0x7f0000004a40)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004a80)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@rand_addr}}, &(0x7f0000004b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004bc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004c80)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000004c40)='/dev/autofs\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000004cc0), &(0x7f0000004d00), &(0x7f0000004d40)) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000004d80)) stat(&(0x7f0000004dc0)='./file0\x00', &(0x7f0000004e00)) lstat(&(0x7f0000004e80)='./file0\x00', &(0x7f0000004ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000085c0)) getuid() lstat(&(0x7f0000008600)='./file0\x00', &(0x7f0000008640)) getpgrp(0xffffffffffffffff) stat(&(0x7f00000086c0)='./file0\x00', &(0x7f0000008700)) lstat(&(0x7f0000008780)='./file0\x00', &(0x7f00000087c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008840)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000008940)=0xe8) lstat(&(0x7f0000008980)='./file0\x00', &(0x7f00000089c0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000008a40)) getresgid(&(0x7f0000008ac0), &(0x7f0000008b00), &(0x7f0000008b40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008b80)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000008c80)=0xe8) lstat(&(0x7f0000008cc0)='./file0\x00', &(0x7f0000008d00)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009440)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000009540)=0xe8) stat(&(0x7f0000009580)='./file0\x00', &(0x7f00000095c0)) syz_open_dev$loop(&(0x7f0000009640)='/dev/loop#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000096c0), &(0x7f0000009700)=0xc) stat(&(0x7f0000009740)='./file0\x00', &(0x7f0000009780)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009800)={{{@in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in=@local}}, &(0x7f0000009900)=0xe8) getgroups(0x0, &(0x7f0000009940)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000ae80)) geteuid() getgroups(0x0, &(0x7f000000aec0)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000000af00), &(0x7f000000af40)=0xc) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f000000c1c0)) fstat(0xffffffffffffffff, &(0x7f000000c200)) getgroups(0x0, &(0x7f000000c280)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000c840)={{{@in=@multicast2, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f000000c940)=0xe8) getegid() getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f000000c980)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f000000ca40), 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000200), 0xce, 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:39:00 executing program 1: clone(0x1003ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000280)={@remote}, &(0x7f00000002c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @loopback}, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000bc0)={@multicast1, @local}, &(0x7f0000000c00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d00)={{{@in=@loopback, @in=@dev}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000e00)=0xfffffffffffffda0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x144c04}, 0xc, &(0x7f00000016c0)={&(0x7f00000011c0)={0xa0, r0, 0x2, 0x70bd26, 0x0, {}, [{{0x8, 0x1, r1}, {0x4}}, {{0x8, 0x1, r2}, {0x78, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}]}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) 03:39:00 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000d00)=0x14, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000fc0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000010c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001100)={0x0, @empty, @loopback}, &(0x7f0000001140)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000011c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000012c0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001300)={0x0, @local, @rand_addr}, &(0x7f0000001340)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000004140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004280)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f000000af00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000af40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000b080)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f000000b180)=0xe8) accept(0xffffffffffffffff, &(0x7f000000b280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000b300)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b340)={@multicast2, @local}, &(0x7f000000b380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b3c0)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f000000b4c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000b5c0)={'ip_vti0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000b600)={{{@in6, @in6=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f000000b700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b780)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000b900)={{{@in=@rand_addr, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f000000ba00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ba80)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bac0)={{{@in=@multicast2, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f000000bbc0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f000000bc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000bc40)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bf80)={@loopback}, &(0x7f000000bfc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c000)={{{@in=@loopback, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f000000c100)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000c140)={0x0, @local, @local}, &(0x7f000000c180)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f000000c280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f000000c300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c340)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000c440)={{{@in6=@loopback, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f000000c540)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000c580)={{{@in=@broadcast, @in6}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f000000c680)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f000000c9c0), &(0x7f000000ca00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000cb00)={'veth0_to_bridge\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000d500)={&(0x7f0000000080), 0xc, &(0x7f000000d4c0)={&(0x7f0000001380)=ANY=[]}}, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:39:00 executing program 3: keyctl$setperm(0x15, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0), 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) ftruncate(0xffffffffffffffff, 0x0) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0xfffffffffffffee4) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @multicast1}}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0xe8) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000a40)) getegid() getegid() fstat(0xffffffffffffffff, &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f0000000640)) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000840)=ANY=[], 0x0) 03:39:00 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rfkill\x00', 0x400800, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) request_key(&(0x7f0000000540)='syzkaller\x00', &(0x7f0000000580), &(0x7f00000005c0)='-keyring#user.\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000600)='asymmetric\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000780), &(0x7f00000006c0), 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000b00)) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700), 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000800)=""/178) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380), &(0x7f0000000040), 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:00 executing program 4: mount$9p_xen(&(0x7f0000000480)='bond0\x00', &(0x7f0000000900)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x0, &(0x7f0000000580)={'trans=xen,'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'bond0\x00'}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6, @in6=@mcast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000280)={0x20}, 0x20) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000940)) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200), 0x4) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000a80)={'nat\x00'}, &(0x7f0000000540)=0x54) open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f00000002c0)={{0x2, 0x0, @rand_addr}, {0x0, @random="419205671896"}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6gre0\x00'}) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0xffffffffffffff8d) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xfd74) getuid() ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000c80)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f00000004c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000680)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)) 03:39:00 executing program 5: ioprio_set$uid(0x3, 0x0, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) prctl$setname(0x25, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x26, &(0x7f00000000c0)='vmnet0md5sum@,cgroup@wlan1@#*^wlan1lo\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000700)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)=ANY=[], &(0x7f0000000480)) dup(0xffffffffffffffff) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "c3c7f00418be0017d8aa1a1c1d646d2879707a57d32ce49dd0e10c79808086c5"}) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@dev, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) syz_open_dev$sndpcmp(&(0x7f0000000600)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000640)=""/156) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), 0xc) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) geteuid() ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') 03:39:00 executing program 2: semget$private(0xffffff7f, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f00000002c0)=""/138) keyctl$set_reqkey_keyring(0xe, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getgroups(0x0, &(0x7f0000000840)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000980)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000009c0)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000dc0)=0xe8) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000ec0)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getegid() getpid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004780), &(0x7f00000047c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004800), &(0x7f0000004840)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004880)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000004980)=0xe8) getgroups(0x0, &(0x7f00000049c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a00), &(0x7f0000004a40)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004a80)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@rand_addr}}, &(0x7f0000004b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004bc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004c80)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000004c40)='/dev/autofs\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000004cc0), &(0x7f0000004d00), &(0x7f0000004d40)) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000004d80)) stat(&(0x7f0000004dc0)='./file0\x00', &(0x7f0000004e00)) lstat(&(0x7f0000004e80)='./file0\x00', &(0x7f0000004ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000085c0)) getuid() lstat(&(0x7f0000008600)='./file0\x00', &(0x7f0000008640)) getpgrp(0xffffffffffffffff) stat(&(0x7f00000086c0)='./file0\x00', &(0x7f0000008700)) lstat(&(0x7f0000008780)='./file0\x00', &(0x7f00000087c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008840)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000008940)=0xe8) lstat(&(0x7f0000008980)='./file0\x00', &(0x7f00000089c0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000008a40)) getresgid(&(0x7f0000008ac0), &(0x7f0000008b00), &(0x7f0000008b40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008b80)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000008c80)=0xe8) lstat(&(0x7f0000008cc0)='./file0\x00', &(0x7f0000008d00)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009440)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000009540)=0xe8) stat(&(0x7f0000009580)='./file0\x00', &(0x7f00000095c0)) syz_open_dev$loop(&(0x7f0000009640)='/dev/loop#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000096c0), &(0x7f0000009700)=0xc) stat(&(0x7f0000009740)='./file0\x00', &(0x7f0000009780)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009800)={{{@in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in=@local}}, &(0x7f0000009900)=0xe8) getgroups(0x0, &(0x7f0000009940)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000ae80)) geteuid() getgroups(0x0, &(0x7f000000aec0)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000000af00), &(0x7f000000af40)=0xc) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f000000c1c0)) fstat(0xffffffffffffffff, &(0x7f000000c200)) getgroups(0x0, &(0x7f000000c280)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000c840)={{{@in=@multicast2, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f000000c940)=0xe8) getegid() getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f000000c980)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f000000ca40), 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000200), 0xce, 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:39:01 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000d00)=0x14, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000fc0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000010c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001100)={0x0, @empty, @loopback}, &(0x7f0000001140)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000011c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000012c0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001300)={0x0, @local, @rand_addr}, &(0x7f0000001340)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000004140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004280)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f000000af00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000af40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000b080)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f000000b180)=0xe8) accept(0xffffffffffffffff, &(0x7f000000b280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000b300)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b340)={@multicast2, @local}, &(0x7f000000b380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b3c0)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f000000b4c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000b5c0)={'ip_vti0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000b600)={{{@in6, @in6=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f000000b700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b780)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000b900)={{{@in=@rand_addr, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f000000ba00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ba80)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bac0)={{{@in=@multicast2, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f000000bbc0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f000000bc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000bc40)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bf80)={@loopback}, &(0x7f000000bfc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c000)={{{@in=@loopback, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f000000c100)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000c140)={0x0, @local, @local}, &(0x7f000000c180)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f000000c280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f000000c300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c340)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000c440)={{{@in6=@loopback, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f000000c540)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000c580)={{{@in=@broadcast, @in6}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f000000c680)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f000000c9c0), &(0x7f000000ca00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000cb00)={'veth0_to_bridge\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000d500)={&(0x7f0000000080), 0xc, &(0x7f000000d4c0)={&(0x7f0000001380)=ANY=[]}}, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:39:01 executing program 3: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x77359400}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='cifs.spnego\x00', &(0x7f00000008c0), &(0x7f0000000500)="657468302da78100", 0xfffffffffffffffd) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740), 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) socket$nl_route(0x10, 0x3, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000015c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000a40)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f00000003c0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000180)) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000840)) getegid() getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) membarrier(0x0, 0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000400), 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) gettid() gettid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004b40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004b80)) getpgrp(0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:39:01 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rfkill\x00', 0x400800, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) request_key(&(0x7f0000000540)='syzkaller\x00', &(0x7f0000000580), &(0x7f00000005c0)='-keyring#user.\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000600)='asymmetric\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000780), &(0x7f00000006c0), 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000b00)) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700), 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000800)=""/178) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380), &(0x7f0000000040), 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:01 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:39:01 executing program 4: mount$9p_xen(&(0x7f0000000480)='bond0\x00', &(0x7f0000000900)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x0, &(0x7f0000000580)={'trans=xen,'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'bond0\x00'}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6, @in6=@mcast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000280)={0x20}, 0x20) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000940)) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200), 0x4) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000a80)={'nat\x00'}, &(0x7f0000000540)=0x54) open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f00000002c0)={{0x2, 0x0, @rand_addr}, {0x0, @random="419205671896"}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6gre0\x00'}) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0xffffffffffffff8d) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xfd74) getuid() ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000c80)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f00000004c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000680)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)) 03:39:01 executing program 2: semget$private(0xffffff7f, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f00000002c0)=""/138) keyctl$set_reqkey_keyring(0xe, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getgroups(0x0, &(0x7f0000000840)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000980)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000009c0)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000dc0)=0xe8) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000ec0)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getegid() getpid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004780), &(0x7f00000047c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004800), &(0x7f0000004840)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004880)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000004980)=0xe8) getgroups(0x0, &(0x7f00000049c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a00), &(0x7f0000004a40)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004a80)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@rand_addr}}, &(0x7f0000004b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004bc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004c80)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000004c40)='/dev/autofs\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000004cc0), &(0x7f0000004d00), &(0x7f0000004d40)) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000004d80)) stat(&(0x7f0000004dc0)='./file0\x00', &(0x7f0000004e00)) lstat(&(0x7f0000004e80)='./file0\x00', &(0x7f0000004ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000085c0)) getuid() lstat(&(0x7f0000008600)='./file0\x00', &(0x7f0000008640)) getpgrp(0xffffffffffffffff) stat(&(0x7f00000086c0)='./file0\x00', &(0x7f0000008700)) lstat(&(0x7f0000008780)='./file0\x00', &(0x7f00000087c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008840)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000008940)=0xe8) lstat(&(0x7f0000008980)='./file0\x00', &(0x7f00000089c0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000008a40)) getresgid(&(0x7f0000008ac0), &(0x7f0000008b00), &(0x7f0000008b40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008b80)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000008c80)=0xe8) lstat(&(0x7f0000008cc0)='./file0\x00', &(0x7f0000008d00)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009440)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000009540)=0xe8) stat(&(0x7f0000009580)='./file0\x00', &(0x7f00000095c0)) syz_open_dev$loop(&(0x7f0000009640)='/dev/loop#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000096c0), &(0x7f0000009700)=0xc) stat(&(0x7f0000009740)='./file0\x00', &(0x7f0000009780)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009800)={{{@in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in=@local}}, &(0x7f0000009900)=0xe8) getgroups(0x0, &(0x7f0000009940)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000ae80)) geteuid() getgroups(0x0, &(0x7f000000aec0)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000000af00), &(0x7f000000af40)=0xc) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f000000c1c0)) fstat(0xffffffffffffffff, &(0x7f000000c200)) getgroups(0x0, &(0x7f000000c280)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000c840)={{{@in=@multicast2, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f000000c940)=0xe8) getegid() getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f000000c980)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f000000ca40), 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000200), 0xce, 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:39:02 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000d00)=0x14, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000fc0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000010c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001100)={0x0, @empty, @loopback}, &(0x7f0000001140)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000011c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000012c0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001300)={0x0, @local, @rand_addr}, &(0x7f0000001340)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000004140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004280)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f000000af00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000af40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000b080)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f000000b180)=0xe8) accept(0xffffffffffffffff, &(0x7f000000b280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000b300)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b340)={@multicast2, @local}, &(0x7f000000b380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b3c0)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f000000b4c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000b5c0)={'ip_vti0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000b600)={{{@in6, @in6=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f000000b700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b780)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000b900)={{{@in=@rand_addr, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f000000ba00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ba80)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bac0)={{{@in=@multicast2, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f000000bbc0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f000000bc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000bc40)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bf80)={@loopback}, &(0x7f000000bfc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c000)={{{@in=@loopback, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f000000c100)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000c140)={0x0, @local, @local}, &(0x7f000000c180)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f000000c280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f000000c300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c340)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000c440)={{{@in6=@loopback, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f000000c540)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000c580)={{{@in=@broadcast, @in6}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f000000c680)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f000000c9c0), &(0x7f000000ca00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000cb00)={'veth0_to_bridge\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000d500)={&(0x7f0000000080), 0xc, &(0x7f000000d4c0)={&(0x7f0000001380)=ANY=[]}}, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:39:02 executing program 3: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x77359400}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='cifs.spnego\x00', &(0x7f00000008c0), &(0x7f0000000500)="657468302da78100", 0xfffffffffffffffd) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740), 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) socket$nl_route(0x10, 0x3, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000015c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000a40)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f00000003c0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000180)) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000840)) getegid() getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) membarrier(0x0, 0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000400), 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) gettid() gettid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004b40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004b80)) getpgrp(0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:39:02 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rfkill\x00', 0x400800, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) request_key(&(0x7f0000000540)='syzkaller\x00', &(0x7f0000000580), &(0x7f00000005c0)='-keyring#user.\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000600)='asymmetric\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000780), &(0x7f00000006c0), 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000b00)) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700), 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000800)=""/178) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380), &(0x7f0000000040), 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:02 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:39:02 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) socketpair(0x1d, 0x80000, 0x0, &(0x7f0000000000)) 03:39:02 executing program 2: getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000380)=@nl=@proc, &(0x7f0000000140)=0xfffffffffffffd4d, 0x0) pipe(&(0x7f0000000040)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000400)={{}, 'port0\x00'}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000680)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000980)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0xffffffffffffc53, &(0x7f0000000900), 0xfffffffffffffdbd}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000dc0)="42804da0c60fef69dc330f0122cec273fe660fef74a409387c3667f9460738286a00f081768cc8000000c481b5e5bc2b00000021f3e12dba32047000000fed84210b000000cacad379dae5cfe5e56aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:39:02 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) socketpair(0x1d, 0x80000, 0x0, &(0x7f0000000000)) [ 1150.027935] can: request_module (can-proto-0) failed. [ 1150.064586] can: request_module (can-proto-0) failed. 03:39:02 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) socketpair(0x1d, 0x80000, 0x0, &(0x7f0000000000)) [ 1150.127639] can: request_module (can-proto-0) failed. 03:39:02 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000d00)=0x14, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000fc0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000010c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001100)={0x0, @empty, @loopback}, &(0x7f0000001140)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000011c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000012c0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001300)={0x0, @local, @rand_addr}, &(0x7f0000001340)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000004140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004280)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f000000af00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000af40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000b080)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f000000b180)=0xe8) accept(0xffffffffffffffff, &(0x7f000000b280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000b300)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b340)={@multicast2, @local}, &(0x7f000000b380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b3c0)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f000000b4c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000b5c0)={'ip_vti0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000b600)={{{@in6, @in6=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f000000b700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b780)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000b900)={{{@in=@rand_addr, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f000000ba00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ba80)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bac0)={{{@in=@multicast2, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f000000bbc0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f000000bc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000bc40)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bf80)={@loopback}, &(0x7f000000bfc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c000)={{{@in=@loopback, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f000000c100)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000c140)={0x0, @local, @local}, &(0x7f000000c180)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f000000c280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f000000c300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c340)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000c440)={{{@in6=@loopback, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f000000c540)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000c580)={{{@in=@broadcast, @in6}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f000000c680)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f000000c9c0), &(0x7f000000ca00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000cb00)={'veth0_to_bridge\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000d500)={&(0x7f0000000080), 0xc, &(0x7f000000d4c0)={&(0x7f0000001380)=ANY=[]}}, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") [ 1150.205654] can: request_module (can-proto-0) failed. 03:39:03 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) socketpair(0x1d, 0x80000, 0x0, &(0x7f0000000000)) 03:39:03 executing program 3: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x77359400}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='cifs.spnego\x00', &(0x7f00000008c0), &(0x7f0000000500)="657468302da78100", 0xfffffffffffffffd) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740), 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) socket$nl_route(0x10, 0x3, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000015c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000a40)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f00000003c0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000180)) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000840)) getegid() getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) membarrier(0x0, 0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000400), 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) gettid() gettid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004b40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004b80)) getpgrp(0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 1150.340762] can: request_module (can-proto-0) failed. 03:39:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7d) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000380)={@multicast2=0xac14140b, @local}, 0x4) 03:39:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7d) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000380)={@multicast2=0xac14140b, @local}, 0x4) 03:39:03 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rfkill\x00', 0x400800, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) request_key(&(0x7f0000000540)='syzkaller\x00', &(0x7f0000000580), &(0x7f00000005c0)='-keyring#user.\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000600)='asymmetric\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000780), &(0x7f00000006c0), 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000b00)) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700), 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000800)=""/178) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380), &(0x7f0000000040), 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7d) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000380)={@multicast2=0xac14140b, @local}, 0x4) 03:39:03 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:39:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7d) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000380)={@multicast2=0xac14140b, @local}, 0x4) 03:39:03 executing program 2: getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000380)=@nl=@proc, &(0x7f0000000140)=0xfffffffffffffd4d, 0x0) pipe(&(0x7f0000000040)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000400)={{}, 'port0\x00'}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000680)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000980)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0xffffffffffffc53, &(0x7f0000000900), 0xfffffffffffffdbd}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000dc0)="42804da0c60fef69dc330f0122cec273fe660fef74a409387c3667f9460738286a00f081768cc8000000c481b5e5bc2b00000021f3e12dba32047000000fed84210b000000cacad379dae5cfe5e56aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:39:03 executing program 4: keyctl$set_reqkey_keyring(0x2, 0xb000425) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000006c0)) socketpair$inet(0x2, 0x0, 0xa962, &(0x7f0000000c80)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @empty, @remote}, &(0x7f0000000280)=0xffffffffffffffdc) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)={@ipv4={[], [], @broadcast}}) clock_gettime(0x0, &(0x7f0000000140)) syz_open_dev$dmmidi(&(0x7f0000000800)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000d80)='/dev/adsp#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000d00)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000640), &(0x7f0000000680)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000980), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000600)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000540), &(0x7f0000000580)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000b40), 0x0, 0x0, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x3f9, &(0x7f00000007c0), 0x0, &(0x7f00000009c0)=""/147, 0x93}, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a00), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000740)={{}, 'port0\x00'}) syz_open_dev$mice(&(0x7f0000000940)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a80)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000340), 0xc, &(0x7f0000000ac0)={&(0x7f0000001000)=ANY=[]}}, 0x0) 03:39:03 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1e010d64ac1e5d31a3b786e2989f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58fe4}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000940)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000580)=0x78) syz_execute_func(&(0x7f00000004c0)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4e19086d90dba8fc9c90feefa4e2179fbe5e565f247af0f2e1ac4010d64ac1e5d31a3b706f08024030866430ff5e04b") ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000200)) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/157, &(0x7f00000000c0)=0x9d) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000840)=ANY=[], 0x0) 03:39:03 executing program 3: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x77359400}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='cifs.spnego\x00', &(0x7f00000008c0), &(0x7f0000000500)="657468302da78100", 0xfffffffffffffffd) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740), 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) socket$nl_route(0x10, 0x3, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000015c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000a40)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f00000003c0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000180)) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000840)) getegid() getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) membarrier(0x0, 0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000400), 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) gettid() gettid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004b40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004b80)) getpgrp(0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:39:04 executing program 0: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) socketpair(0x11, 0x80000, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) prctl$setptracer(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r3 = semget(0x2, 0x0, 0x2) semctl$GETVAL(r3, 0x4, 0xc, &(0x7f00000001c0)=""/194) r4 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) sendfile(r1, r4, &(0x7f0000d83ff8)=0x2a00, 0x8000fffffffe) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f00000000c0)) 03:39:04 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:39:04 executing program 2: getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000380)=@nl=@proc, &(0x7f0000000140)=0xfffffffffffffd4d, 0x0) pipe(&(0x7f0000000040)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000400)={{}, 'port0\x00'}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000680)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000980)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0xffffffffffffc53, &(0x7f0000000900), 0xfffffffffffffdbd}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000dc0)="42804da0c60fef69dc330f0122cec273fe660fef74a409387c3667f9460738286a00f081768cc8000000c481b5e5bc2b00000021f3e12dba32047000000fed84210b000000cacad379dae5cfe5e56aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:39:04 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) read(r0, &(0x7f0000000040)=""/198, 0xc6) write$FUSE_WRITE(r0, &(0x7f0000000000)={0x18, 0x0, 0x1}, 0x18) 03:39:04 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1e010d64ac1e5d31a3b786e2989f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58fe4}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000940)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000580)=0x78) syz_execute_func(&(0x7f00000004c0)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4e19086d90dba8fc9c90feefa4e2179fbe5e565f247af0f2e1ac4010d64ac1e5d31a3b706f08024030866430ff5e04b") ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000200)) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/157, &(0x7f00000000c0)=0x9d) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000840)=ANY=[], 0x0) 03:39:04 executing program 4: keyctl$set_reqkey_keyring(0x2, 0xb000425) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000006c0)) socketpair$inet(0x2, 0x0, 0xa962, &(0x7f0000000c80)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @empty, @remote}, &(0x7f0000000280)=0xffffffffffffffdc) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)={@ipv4={[], [], @broadcast}}) clock_gettime(0x0, &(0x7f0000000140)) syz_open_dev$dmmidi(&(0x7f0000000800)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000d80)='/dev/adsp#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000d00)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000640), &(0x7f0000000680)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000980), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000600)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000540), &(0x7f0000000580)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000b40), 0x0, 0x0, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x3f9, &(0x7f00000007c0), 0x0, &(0x7f00000009c0)=""/147, 0x93}, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a00), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000740)={{}, 'port0\x00'}) syz_open_dev$mice(&(0x7f0000000940)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a80)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000340), 0xc, &(0x7f0000000ac0)={&(0x7f0000001000)=ANY=[]}}, 0x0) 03:39:04 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) read(r0, &(0x7f0000000040)=""/198, 0xc6) write$FUSE_WRITE(r0, &(0x7f0000000000)={0x18, 0x0, 0x1}, 0x18) 03:39:05 executing program 0: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) socketpair(0x11, 0x80000, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) prctl$setptracer(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r3 = semget(0x2, 0x0, 0x2) semctl$GETVAL(r3, 0x4, 0xc, &(0x7f00000001c0)=""/194) r4 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) sendfile(r1, r4, &(0x7f0000d83ff8)=0x2a00, 0x8000fffffffe) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f00000000c0)) 03:39:05 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) read(r0, &(0x7f0000000040)=""/198, 0xc6) write$FUSE_WRITE(r0, &(0x7f0000000000)={0x18, 0x0, 0x1}, 0x18) 03:39:05 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) read(r0, &(0x7f0000000040)=""/198, 0xc6) write$FUSE_WRITE(r0, &(0x7f0000000000)={0x18, 0x0, 0x1}, 0x18) 03:39:05 executing program 5: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) socketpair(0x11, 0x80000, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) prctl$setptracer(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r3 = semget(0x2, 0x0, 0x2) semctl$GETVAL(r3, 0x4, 0xc, &(0x7f00000001c0)=""/194) r4 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) sendfile(r1, r4, &(0x7f0000d83ff8)=0x2a00, 0x8000fffffffe) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f00000000c0)) 03:39:05 executing program 3: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) socketpair(0x11, 0x80000, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) prctl$setptracer(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r3 = semget(0x2, 0x0, 0x2) semctl$GETVAL(r3, 0x4, 0xc, &(0x7f00000001c0)=""/194) r4 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) sendfile(r1, r4, &(0x7f0000d83ff8)=0x2a00, 0x8000fffffffe) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f00000000c0)) 03:39:05 executing program 2: getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000380)=@nl=@proc, &(0x7f0000000140)=0xfffffffffffffd4d, 0x0) pipe(&(0x7f0000000040)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000400)={{}, 'port0\x00'}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000680)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000980)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0xffffffffffffc53, &(0x7f0000000900), 0xfffffffffffffdbd}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000dc0)="42804da0c60fef69dc330f0122cec273fe660fef74a409387c3667f9460738286a00f081768cc8000000c481b5e5bc2b00000021f3e12dba32047000000fed84210b000000cacad379dae5cfe5e56aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:39:05 executing program 0: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) socketpair(0x11, 0x80000, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) prctl$setptracer(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r3 = semget(0x2, 0x0, 0x2) semctl$GETVAL(r3, 0x4, 0xc, &(0x7f00000001c0)=""/194) r4 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) sendfile(r1, r4, &(0x7f0000d83ff8)=0x2a00, 0x8000fffffffe) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f00000000c0)) 03:39:05 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1e010d64ac1e5d31a3b786e2989f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58fe4}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000940)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000580)=0x78) syz_execute_func(&(0x7f00000004c0)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4e19086d90dba8fc9c90feefa4e2179fbe5e565f247af0f2e1ac4010d64ac1e5d31a3b706f08024030866430ff5e04b") ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000200)) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/157, &(0x7f00000000c0)=0x9d) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000840)=ANY=[], 0x0) 03:39:06 executing program 4: keyctl$set_reqkey_keyring(0x2, 0xb000425) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000006c0)) socketpair$inet(0x2, 0x0, 0xa962, &(0x7f0000000c80)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @empty, @remote}, &(0x7f0000000280)=0xffffffffffffffdc) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)={@ipv4={[], [], @broadcast}}) clock_gettime(0x0, &(0x7f0000000140)) syz_open_dev$dmmidi(&(0x7f0000000800)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000d80)='/dev/adsp#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000d00)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000640), &(0x7f0000000680)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000980), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000600)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000540), &(0x7f0000000580)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000b40), 0x0, 0x0, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x3f9, &(0x7f00000007c0), 0x0, &(0x7f00000009c0)=""/147, 0x93}, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a00), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000740)={{}, 'port0\x00'}) syz_open_dev$mice(&(0x7f0000000940)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a80)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000340), 0xc, &(0x7f0000000ac0)={&(0x7f0000001000)=ANY=[]}}, 0x0) 03:39:06 executing program 5: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) socketpair(0x11, 0x80000, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) prctl$setptracer(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r3 = semget(0x2, 0x0, 0x2) semctl$GETVAL(r3, 0x4, 0xc, &(0x7f00000001c0)=""/194) r4 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) sendfile(r1, r4, &(0x7f0000d83ff8)=0x2a00, 0x8000fffffffe) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f00000000c0)) 03:39:06 executing program 3: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) socketpair(0x11, 0x80000, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) prctl$setptracer(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r3 = semget(0x2, 0x0, 0x2) semctl$GETVAL(r3, 0x4, 0xc, &(0x7f00000001c0)=""/194) r4 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) sendfile(r1, r4, &(0x7f0000d83ff8)=0x2a00, 0x8000fffffffe) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f00000000c0)) 03:39:06 executing program 2: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000440)={&(0x7f0000000400), 0x8}) pipe2$9p(&(0x7f0000000540), 0x0) read(0xffffffffffffffff, &(0x7f0000000640)=""/72, 0x48) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) pipe2(&(0x7f0000000140), 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000500)) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000700)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getpgrp(0xffffffffffffffff) geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c00)) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getgroups(0x0, &(0x7f00000012c0)) getpid() stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000018c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000001a40)=0xe8) getegid() getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b40)={{{@in=@multicast2, @in=@loopback}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000001c40)=0xe8) stat(&(0x7f0000001c80)='./file0/file0\x00', &(0x7f0000001cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001d40)) syz_execute_func(&(0x7f00000019c0)="42805da0d1c4427d13380f01ee660f3a608600088041cb913591913d06290077b478993d233d23410feefa6b2179660f38302f660f3adf03cb2e470f9b243c40697907ffffffffc44379dfb9d6adbe90dfe2989f7f") 03:39:06 executing program 0: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) socketpair(0x11, 0x80000, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) prctl$setptracer(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r3 = semget(0x2, 0x0, 0x2) semctl$GETVAL(r3, 0x4, 0xc, &(0x7f00000001c0)=""/194) r4 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) sendfile(r1, r4, &(0x7f0000d83ff8)=0x2a00, 0x8000fffffffe) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f00000000c0)) 03:39:06 executing program 2: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000440)={&(0x7f0000000400), 0x8}) pipe2$9p(&(0x7f0000000540), 0x0) read(0xffffffffffffffff, &(0x7f0000000640)=""/72, 0x48) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) pipe2(&(0x7f0000000140), 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000500)) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000700)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getpgrp(0xffffffffffffffff) geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c00)) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getgroups(0x0, &(0x7f00000012c0)) getpid() stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000018c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000001a40)=0xe8) getegid() getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b40)={{{@in=@multicast2, @in=@loopback}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000001c40)=0xe8) stat(&(0x7f0000001c80)='./file0/file0\x00', &(0x7f0000001cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001d40)) syz_execute_func(&(0x7f00000019c0)="42805da0d1c4427d13380f01ee660f3a608600088041cb913591913d06290077b478993d233d23410feefa6b2179660f38302f660f3adf03cb2e470f9b243c40697907ffffffffc44379dfb9d6adbe90dfe2989f7f") 03:39:06 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1e010d64ac1e5d31a3b786e2989f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58fe4}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000940)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000580)=0x78) syz_execute_func(&(0x7f00000004c0)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4e19086d90dba8fc9c90feefa4e2179fbe5e565f247af0f2e1ac4010d64ac1e5d31a3b706f08024030866430ff5e04b") ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000200)) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/157, &(0x7f00000000c0)=0x9d) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000840)=ANY=[], 0x0) 03:39:07 executing program 4: keyctl$set_reqkey_keyring(0x2, 0xb000425) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000006c0)) socketpair$inet(0x2, 0x0, 0xa962, &(0x7f0000000c80)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @empty, @remote}, &(0x7f0000000280)=0xffffffffffffffdc) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)={@ipv4={[], [], @broadcast}}) clock_gettime(0x0, &(0x7f0000000140)) syz_open_dev$dmmidi(&(0x7f0000000800)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000d80)='/dev/adsp#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000d00)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000640), &(0x7f0000000680)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000980), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000600)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000540), &(0x7f0000000580)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000b40), 0x0, 0x0, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x3f9, &(0x7f00000007c0), 0x0, &(0x7f00000009c0)=""/147, 0x93}, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a00), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000740)={{}, 'port0\x00'}) syz_open_dev$mice(&(0x7f0000000940)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a80)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000340), 0xc, &(0x7f0000000ac0)={&(0x7f0000001000)=ANY=[]}}, 0x0) 03:39:07 executing program 2: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000440)={&(0x7f0000000400), 0x8}) pipe2$9p(&(0x7f0000000540), 0x0) read(0xffffffffffffffff, &(0x7f0000000640)=""/72, 0x48) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) pipe2(&(0x7f0000000140), 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000500)) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000700)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getpgrp(0xffffffffffffffff) geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c00)) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getgroups(0x0, &(0x7f00000012c0)) getpid() stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000018c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000001a40)=0xe8) getegid() getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b40)={{{@in=@multicast2, @in=@loopback}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000001c40)=0xe8) stat(&(0x7f0000001c80)='./file0/file0\x00', &(0x7f0000001cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001d40)) syz_execute_func(&(0x7f00000019c0)="42805da0d1c4427d13380f01ee660f3a608600088041cb913591913d06290077b478993d233d23410feefa6b2179660f38302f660f3adf03cb2e470f9b243c40697907ffffffffc44379dfb9d6adbe90dfe2989f7f") 03:39:07 executing program 3: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) socketpair(0x11, 0x80000, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) prctl$setptracer(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r3 = semget(0x2, 0x0, 0x2) semctl$GETVAL(r3, 0x4, 0xc, &(0x7f00000001c0)=""/194) r4 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) sendfile(r1, r4, &(0x7f0000d83ff8)=0x2a00, 0x8000fffffffe) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f00000000c0)) 03:39:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) shutdown(r0, 0xfffffffffffffffd) futex(&(0x7f0000004000), 0x0, 0x0, &(0x7f0000000040), &(0x7f0000004000), 0x0) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x801) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x7, 0x0) 03:39:07 executing program 5: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) socketpair(0x11, 0x80000, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) prctl$setptracer(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r3 = semget(0x2, 0x0, 0x2) semctl$GETVAL(r3, 0x4, 0xc, &(0x7f00000001c0)=""/194) r4 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) sendfile(r1, r4, &(0x7f0000d83ff8)=0x2a00, 0x8000fffffffe) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f00000000c0)) 03:39:07 executing program 1: creat(&(0x7f0000000440)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000740)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004640)={'ipddp0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000046c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004700)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004740)={'syzkaller0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004780)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000004880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000048c0)={@mcast1}, &(0x7f0000004900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004940)={'bcsh0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000004ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004b00)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004c40)={{{@in=@broadcast, @in6=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000004d40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004e40)={{{@in6=@remote, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000004f40)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000004f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004fc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005000)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000005100)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005200)={@mcast2}, &(0x7f0000005240)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005300)={{{@in=@dev, @in=@dev}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000005400)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000005b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005bc0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006000)={{{@in6=@mcast2, @in6}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000006100)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000008780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000087c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a7c0)={@dev, @loopback}, &(0x7f000000a800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a840)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f000000a940)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000aa40)={@local, @multicast1}, &(0x7f000000aa80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000ab80)={{{@in6=@dev, @in=@remote}}, {{}, 0x0, @in=@broadcast}}, &(0x7f000000ac80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f000000acc0)={'bond_slave_0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000ad00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000ad40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000ad80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000adc0)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f000000ae00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ae40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ae80)={0x0, @rand_addr, @loopback}, &(0x7f000000aec0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000af00)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f000000b000)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f000000b040)=@ll, &(0x7f000000b0c0)=0x80) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bbc0)={&(0x7f0000000540), 0xc, &(0x7f000000bb80)={&(0x7f000000b100)=ANY=[]}}, 0x0) prctl$intptr(0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@loopback}, &(0x7f00000004c0)=0x14) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000500)) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000380)='syz1\x00') write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000005c0)={0x18}, 0x18) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000200)) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) 03:39:07 executing program 2: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000440)={&(0x7f0000000400), 0x8}) pipe2$9p(&(0x7f0000000540), 0x0) read(0xffffffffffffffff, &(0x7f0000000640)=""/72, 0x48) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) pipe2(&(0x7f0000000140), 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000500)) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000700)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getpgrp(0xffffffffffffffff) geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c00)) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getgroups(0x0, &(0x7f00000012c0)) getpid() stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000018c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000001a40)=0xe8) getegid() getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b40)={{{@in=@multicast2, @in=@loopback}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000001c40)=0xe8) stat(&(0x7f0000001c80)='./file0/file0\x00', &(0x7f0000001cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001d40)) syz_execute_func(&(0x7f00000019c0)="42805da0d1c4427d13380f01ee660f3a608600088041cb913591913d06290077b478993d233d23410feefa6b2179660f38302f660f3adf03cb2e470f9b243c40697907ffffffffc44379dfb9d6adbe90dfe2989f7f") 03:39:07 executing program 0: semctl$IPC_RMID(0x0, 0x0, 0x12) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0726969ef69dc00d99069203737c3397c2a0626a540a52ef34298c4215971e400e5e5c4a2a10f9344613232231569c8212e1a1a3ef0f6585501c4e1edd1f631a3b786e298edc4227992749f55") 03:39:07 executing program 5: clock_gettime(0x0, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00') getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000180)=""/84, &(0x7f0000000100)=0x54) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) pwrite64(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @loopback, @remote}, &(0x7f00000004c0)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000400)=0x100) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000440), 0x8) getresuid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), 0x0, 0x0, 0xfffffffffffffffa) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a05e0f96a0a3bcae9af00fbab7000000217d65e09b6920375137c3662e363626460f38f16e4cc4c37c6d9ea80000004e670624f20f2bac090d000000bb00000040428fb07e6767e5410d45800f2e8f0850cc293201460f01ee420f820e00000027") write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28}, 0xfffffffffffffeeb) 03:39:08 executing program 2: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000840)=""/66, &(0x7f00000008c0)=0x42) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sched_getattr(0x0, &(0x7f0000000180), 0x30, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000a40)) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$alg(0x26, 0x5, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:39:08 executing program 4: dup(0xffffffffffffffff) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 03:39:08 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000004c0)) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 03:39:08 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000004c0)) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 03:39:08 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000004c0)) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 03:39:08 executing program 1: creat(&(0x7f0000000440)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000740)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004640)={'ipddp0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000046c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004700)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004740)={'syzkaller0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004780)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000004880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000048c0)={@mcast1}, &(0x7f0000004900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004940)={'bcsh0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000004ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004b00)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004c40)={{{@in=@broadcast, @in6=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000004d40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004e40)={{{@in6=@remote, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000004f40)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000004f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004fc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005000)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000005100)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005200)={@mcast2}, &(0x7f0000005240)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005300)={{{@in=@dev, @in=@dev}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000005400)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000005b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005bc0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006000)={{{@in6=@mcast2, @in6}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000006100)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000008780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000087c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a7c0)={@dev, @loopback}, &(0x7f000000a800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a840)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f000000a940)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000aa40)={@local, @multicast1}, &(0x7f000000aa80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000ab80)={{{@in6=@dev, @in=@remote}}, {{}, 0x0, @in=@broadcast}}, &(0x7f000000ac80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f000000acc0)={'bond_slave_0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000ad00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000ad40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000ad80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000adc0)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f000000ae00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ae40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ae80)={0x0, @rand_addr, @loopback}, &(0x7f000000aec0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000af00)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f000000b000)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f000000b040)=@ll, &(0x7f000000b0c0)=0x80) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bbc0)={&(0x7f0000000540), 0xc, &(0x7f000000bb80)={&(0x7f000000b100)=ANY=[]}}, 0x0) prctl$intptr(0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@loopback}, &(0x7f00000004c0)=0x14) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000500)) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000380)='syz1\x00') write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000005c0)={0x18}, 0x18) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000200)) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) 03:39:08 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000004c0)) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 03:39:08 executing program 0: semctl$IPC_RMID(0x0, 0x0, 0x12) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0726969ef69dc00d99069203737c3397c2a0626a540a52ef34298c4215971e400e5e5c4a2a10f9344613232231569c8212e1a1a3ef0f6585501c4e1edd1f631a3b786e298edc4227992749f55") 03:39:08 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)=@ipx={0x4, 0x80000001, 0x0, "0950fe4adba7"}, 0x16, &(0x7f0000000000), 0x0, &(0x7f0000000240)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6}, 0x2c) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)=@sco={0x1f, {0x8, 0x0, 0x2}}, 0x80, &(0x7f0000000300)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000000000), 0x2b5) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/98, 0x62}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/115, 0x73}], 0x5}, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31100, 0x894f, 0x5, @dev={0xfe, 0x80, [0x0, 0x800000000000000, 0x0, 0x329]}}, 0x80, &(0x7f0000000340), 0x3c1, &(0x7f0000000380)}, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400), 0xc, &(0x7f0000000580)={&(0x7f00000038c0)={0x14, 0x0, 0x6, 0x0, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x8}}, 0x14}}, 0x20000000) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)) 03:39:09 executing program 2: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000840)=""/66, &(0x7f00000008c0)=0x42) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sched_getattr(0x0, &(0x7f0000000180), 0x30, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000a40)) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$alg(0x26, 0x5, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:39:09 executing program 1: creat(&(0x7f0000000440)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000740)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004640)={'ipddp0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000046c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004700)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004740)={'syzkaller0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004780)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000004880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000048c0)={@mcast1}, &(0x7f0000004900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004940)={'bcsh0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000004ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004b00)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004c40)={{{@in=@broadcast, @in6=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000004d40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004e40)={{{@in6=@remote, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000004f40)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000004f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004fc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005000)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000005100)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005200)={@mcast2}, &(0x7f0000005240)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005300)={{{@in=@dev, @in=@dev}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000005400)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000005b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005bc0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006000)={{{@in6=@mcast2, @in6}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000006100)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000008780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000087c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a7c0)={@dev, @loopback}, &(0x7f000000a800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a840)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f000000a940)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000aa40)={@local, @multicast1}, &(0x7f000000aa80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000ab80)={{{@in6=@dev, @in=@remote}}, {{}, 0x0, @in=@broadcast}}, &(0x7f000000ac80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f000000acc0)={'bond_slave_0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000ad00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000ad40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000ad80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000adc0)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f000000ae00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ae40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ae80)={0x0, @rand_addr, @loopback}, &(0x7f000000aec0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000af00)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f000000b000)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f000000b040)=@ll, &(0x7f000000b0c0)=0x80) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bbc0)={&(0x7f0000000540), 0xc, &(0x7f000000bb80)={&(0x7f000000b100)=ANY=[]}}, 0x0) prctl$intptr(0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@loopback}, &(0x7f00000004c0)=0x14) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000500)) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000380)='syz1\x00') write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000005c0)={0x18}, 0x18) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000200)) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) [ 1156.630838] cgroup: fork rejected by pids controller in /syz3 03:39:09 executing program 5: clock_gettime(0x0, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00') getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000180)=""/84, &(0x7f0000000100)=0x54) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) pwrite64(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @loopback, @remote}, &(0x7f00000004c0)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000400)=0x100) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000440), 0x8) getresuid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), 0x0, 0x0, 0xfffffffffffffffa) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a05e0f96a0a3bcae9af00fbab7000000217d65e09b6920375137c3662e363626460f38f16e4cc4c37c6d9ea80000004e670624f20f2bac090d000000bb00000040428fb07e6767e5410d45800f2e8f0850cc293201460f01ee420f820e00000027") write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28}, 0xfffffffffffffeeb) 03:39:09 executing program 0: semctl$IPC_RMID(0x0, 0x0, 0x12) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0726969ef69dc00d99069203737c3397c2a0626a540a52ef34298c4215971e400e5e5c4a2a10f9344613232231569c8212e1a1a3ef0f6585501c4e1edd1f631a3b786e298edc4227992749f55") 03:39:09 executing program 4: dup(0xffffffffffffffff) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 03:39:10 executing program 2: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000840)=""/66, &(0x7f00000008c0)=0x42) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sched_getattr(0x0, &(0x7f0000000180), 0x30, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000a40)) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$alg(0x26, 0x5, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:39:10 executing program 1: creat(&(0x7f0000000440)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000740)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004640)={'ipddp0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000046c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004700)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004740)={'syzkaller0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004780)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000004880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000048c0)={@mcast1}, &(0x7f0000004900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004940)={'bcsh0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000004ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004b00)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004c40)={{{@in=@broadcast, @in6=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000004d40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004e40)={{{@in6=@remote, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000004f40)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000004f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004fc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005000)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000005100)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005200)={@mcast2}, &(0x7f0000005240)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005300)={{{@in=@dev, @in=@dev}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000005400)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000005b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005bc0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006000)={{{@in6=@mcast2, @in6}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000006100)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000008780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000087c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a7c0)={@dev, @loopback}, &(0x7f000000a800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a840)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f000000a940)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000aa40)={@local, @multicast1}, &(0x7f000000aa80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000ab80)={{{@in6=@dev, @in=@remote}}, {{}, 0x0, @in=@broadcast}}, &(0x7f000000ac80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f000000acc0)={'bond_slave_0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000ad00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000ad40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000ad80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000adc0)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f000000ae00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ae40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ae80)={0x0, @rand_addr, @loopback}, &(0x7f000000aec0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000af00)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f000000b000)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f000000b040)=@ll, &(0x7f000000b0c0)=0x80) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bbc0)={&(0x7f0000000540), 0xc, &(0x7f000000bb80)={&(0x7f000000b100)=ANY=[]}}, 0x0) prctl$intptr(0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@loopback}, &(0x7f00000004c0)=0x14) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000500)) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000380)='syz1\x00') write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000005c0)={0x18}, 0x18) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000200)) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) 03:39:10 executing program 0: semctl$IPC_RMID(0x0, 0x0, 0x12) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0726969ef69dc00d99069203737c3397c2a0626a540a52ef34298c4215971e400e5e5c4a2a10f9344613232231569c8212e1a1a3ef0f6585501c4e1edd1f631a3b786e298edc4227992749f55") 03:39:10 executing program 5: clock_gettime(0x0, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00') getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000180)=""/84, &(0x7f0000000100)=0x54) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) pwrite64(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @loopback, @remote}, &(0x7f00000004c0)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000400)=0x100) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000440), 0x8) getresuid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), 0x0, 0x0, 0xfffffffffffffffa) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a05e0f96a0a3bcae9af00fbab7000000217d65e09b6920375137c3662e363626460f38f16e4cc4c37c6d9ea80000004e670624f20f2bac090d000000bb00000040428fb07e6767e5410d45800f2e8f0850cc293201460f01ee420f820e00000027") write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28}, 0xfffffffffffffeeb) 03:39:10 executing program 4: dup(0xffffffffffffffff) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 03:39:11 executing program 2: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000840)=""/66, &(0x7f00000008c0)=0x42) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sched_getattr(0x0, &(0x7f0000000180), 0x30, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000a40)) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$alg(0x26, 0x5, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:39:12 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)=@ipx={0x4, 0x80000001, 0x0, "0950fe4adba7"}, 0x16, &(0x7f0000000000), 0x0, &(0x7f0000000240)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6}, 0x2c) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)=@sco={0x1f, {0x8, 0x0, 0x2}}, 0x80, &(0x7f0000000300)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000000000), 0x2b5) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/98, 0x62}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/115, 0x73}], 0x5}, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31100, 0x894f, 0x5, @dev={0xfe, 0x80, [0x0, 0x800000000000000, 0x0, 0x329]}}, 0x80, &(0x7f0000000340), 0x3c1, &(0x7f0000000380)}, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400), 0xc, &(0x7f0000000580)={&(0x7f00000038c0)={0x14, 0x0, 0x6, 0x0, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x8}}, 0x14}}, 0x20000000) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)) 03:39:12 executing program 5: clock_gettime(0x0, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00') getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000180)=""/84, &(0x7f0000000100)=0x54) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) pwrite64(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @loopback, @remote}, &(0x7f00000004c0)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000400)=0x100) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000440), 0x8) getresuid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), 0x0, 0x0, 0xfffffffffffffffa) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a05e0f96a0a3bcae9af00fbab7000000217d65e09b6920375137c3662e363626460f38f16e4cc4c37c6d9ea80000004e670624f20f2bac090d000000bb00000040428fb07e6767e5410d45800f2e8f0850cc293201460f01ee420f820e00000027") write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28}, 0xfffffffffffffeeb) 03:39:12 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000580)='/dev/audio#\x00', 0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000200)=0x1c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000540)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000440)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) accept$alg(0xffffffffffffff9c, 0x0, 0x0) eventfd(0x0) getgid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)=@l2, 0x80, &(0x7f0000000800), 0x0, &(0x7f00000008c0)=""/244, 0xf4}, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000a40)=""/81) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eecec4418571d3a6183737c4c19086d9f28fc9410feefab3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b76747d821e2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000004c0)=""/27) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000480)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000500)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000240), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={@loopback, @multicast2}, &(0x7f0000000380)=0xc) 03:39:12 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x106010100000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='gretap0\x00', 0x10) bind$llc(r0, &(0x7f0000000000)={0x1a, 0x31e, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) 03:39:12 executing program 4: dup(0xffffffffffffffff) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 03:39:12 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)=@ipx={0x4, 0x80000001, 0x0, "0950fe4adba7"}, 0x16, &(0x7f0000000000), 0x0, &(0x7f0000000240)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6}, 0x2c) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)=@sco={0x1f, {0x8, 0x0, 0x2}}, 0x80, &(0x7f0000000300)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000000000), 0x2b5) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/98, 0x62}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/115, 0x73}], 0x5}, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31100, 0x894f, 0x5, @dev={0xfe, 0x80, [0x0, 0x800000000000000, 0x0, 0x329]}}, 0x80, &(0x7f0000000340), 0x3c1, &(0x7f0000000380)}, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400), 0xc, &(0x7f0000000580)={&(0x7f00000038c0)={0x14, 0x0, 0x6, 0x0, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x8}}, 0x14}}, 0x20000000) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)) 03:39:12 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x106010100000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='gretap0\x00', 0x10) bind$llc(r0, &(0x7f0000000000)={0x1a, 0x31e, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) 03:39:12 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x106010100000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='gretap0\x00', 0x10) bind$llc(r0, &(0x7f0000000000)={0x1a, 0x31e, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) 03:39:13 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x106010100000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='gretap0\x00', 0x10) bind$llc(r0, &(0x7f0000000000)={0x1a, 0x31e, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) 03:39:13 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000580)='/dev/audio#\x00', 0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000200)=0x1c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000540)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000440)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) accept$alg(0xffffffffffffff9c, 0x0, 0x0) eventfd(0x0) getgid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)=@l2, 0x80, &(0x7f0000000800), 0x0, &(0x7f00000008c0)=""/244, 0xf4}, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000a40)=""/81) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eecec4418571d3a6183737c4c19086d9f28fc9410feefab3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b76747d821e2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000004c0)=""/27) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000480)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000500)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000240), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={@loopback, @multicast2}, &(0x7f0000000380)=0xc) 03:39:13 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000580)='/dev/audio#\x00', 0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000200)=0x1c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000540)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000440)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) accept$alg(0xffffffffffffff9c, 0x0, 0x0) eventfd(0x0) getgid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)=@l2, 0x80, &(0x7f0000000800), 0x0, &(0x7f00000008c0)=""/244, 0xf4}, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000a40)=""/81) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eecec4418571d3a6183737c4c19086d9f28fc9410feefab3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b76747d821e2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000004c0)=""/27) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000480)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000500)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000240), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={@loopback, @multicast2}, &(0x7f0000000380)=0xc) 03:39:14 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000580)='/dev/audio#\x00', 0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000200)=0x1c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000540)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000440)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) accept$alg(0xffffffffffffff9c, 0x0, 0x0) eventfd(0x0) getgid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)=@l2, 0x80, &(0x7f0000000800), 0x0, &(0x7f00000008c0)=""/244, 0xf4}, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000a40)=""/81) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eecec4418571d3a6183737c4c19086d9f28fc9410feefab3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b76747d821e2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000004c0)=""/27) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000480)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000500)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000240), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={@loopback, @multicast2}, &(0x7f0000000380)=0xc) 03:39:14 executing program 2: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000580)='/dev/audio#\x00', 0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000200)=0x1c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000540)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000440)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) accept$alg(0xffffffffffffff9c, 0x0, 0x0) eventfd(0x0) getgid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)=@l2, 0x80, &(0x7f0000000800), 0x0, &(0x7f00000008c0)=""/244, 0xf4}, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000a40)=""/81) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eecec4418571d3a6183737c4c19086d9f28fc9410feefab3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b76747d821e2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000004c0)=""/27) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000480)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000500)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000240), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={@loopback, @multicast2}, &(0x7f0000000380)=0xc) 03:39:14 executing program 4: clock_gettime(0x0, &(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) syz_execute_func(&(0x7f0000000140)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:39:14 executing program 5: semget$private(0x0, 0x7d00, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000001740)=""/4096) unshare(0x0) futex(&(0x7f00000003c0), 0x9, 0x0, &(0x7f00000004c0)={0x77359400}, &(0x7f0000000500), 0x0) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000340), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0)) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000200)) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000240)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) fstat(0xffffffffffffffff, &(0x7f0000000440)) ioprio_get$uid(0x0, 0x0) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000180)) accept4$unix(0xffffffffffffff9c, &(0x7f0000000540), &(0x7f0000000380)=0x6e, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000640)) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") socket$bt_bnep(0x1f, 0x3, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) 03:39:15 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)=@ipx={0x4, 0x80000001, 0x0, "0950fe4adba7"}, 0x16, &(0x7f0000000000), 0x0, &(0x7f0000000240)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6}, 0x2c) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)=@sco={0x1f, {0x8, 0x0, 0x2}}, 0x80, &(0x7f0000000300)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000000000), 0x2b5) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/98, 0x62}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/115, 0x73}], 0x5}, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31100, 0x894f, 0x5, @dev={0xfe, 0x80, [0x0, 0x800000000000000, 0x0, 0x329]}}, 0x80, &(0x7f0000000340), 0x3c1, &(0x7f0000000380)}, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400), 0xc, &(0x7f0000000580)={&(0x7f00000038c0)={0x14, 0x0, 0x6, 0x0, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x8}}, 0x14}}, 0x20000000) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)) 03:39:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x20004e20}, 0x1c) listen(r1, 0x0) accept4(r1, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80, 0x0) shutdown(r1, 0x0) 03:39:15 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f000001cff0)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000080)={&(0x7f0000000100)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000001240)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f00000011c0), &(0x7f0000001200)}}, @mask_fadd={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f00000000c0)}}], 0x71}, 0x0) 03:39:15 executing program 4: clock_gettime(0x0, &(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) syz_execute_func(&(0x7f0000000140)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 1163.015723] IPVS: ftp: loaded support on port[0] = 21 03:39:15 executing program 2: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000580)='/dev/audio#\x00', 0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000200)=0x1c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000540)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000440)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) accept$alg(0xffffffffffffff9c, 0x0, 0x0) eventfd(0x0) getgid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)=@l2, 0x80, &(0x7f0000000800), 0x0, &(0x7f00000008c0)=""/244, 0xf4}, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000a40)=""/81) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eecec4418571d3a6183737c4c19086d9f28fc9410feefab3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b76747d821e2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000004c0)=""/27) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000480)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000500)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000240), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={@loopback, @multicast2}, &(0x7f0000000380)=0xc) 03:39:16 executing program 1: getrandom(&(0x7f0000000040)=""/148, 0xfffffffffffffd2b, 0x3) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) timerfd_create(0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000380)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getpgid(0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, &(0x7f0000000580)={&(0x7f0000000800)=ANY=[]}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440), 0x2c) socket$inet6(0xa, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'dummy0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'rose0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00)={@multicast1, @multicast2}, &(0x7f0000000140)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@remote}, &(0x7f00000008c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c80)={@remote}, &(0x7f0000000cc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002200)={{{@in=@loopback, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000002300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002340)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002380)={{{@in=@dev, @in=@rand_addr}}, {{}, 0x0, @in6=@local}}, &(0x7f0000002480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000024c0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002500)={{{@in=@rand_addr, @in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000002600)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002640)={{{@in=@loopback, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000002740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002840)={{{@in=@multicast1, @in=@dev}}, {{}, 0x0, @in=@dev}}, &(0x7f0000002940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b40)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000002c40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e00)={{{@in=@remote, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000a80)=0x6b9) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002f40), &(0x7f0000002f80)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003000)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003100)={{{@in=@multicast1, @in6=@ipv4={[], [], @dev}}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000003200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000004dc0)=@ll, &(0x7f0000004e40)=0x80) accept4$packet(0xffffffffffffff9c, &(0x7f0000004f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004f80)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004fc0)={{{@in6=@ipv4={[], [], @loopback}, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f00000050c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005100)={@remote, @remote}, &(0x7f0000005140)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005180)={'irlan0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f00000051c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005200)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005980)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000059c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005a00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005a40)={{{@in6, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000005b40)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") 03:39:16 executing program 2: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000580)='/dev/audio#\x00', 0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000200)=0x1c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000540)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000440)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) accept$alg(0xffffffffffffff9c, 0x0, 0x0) eventfd(0x0) getgid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)=@l2, 0x80, &(0x7f0000000800), 0x0, &(0x7f00000008c0)=""/244, 0xf4}, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000a40)=""/81) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eecec4418571d3a6183737c4c19086d9f28fc9410feefab3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b76747d821e2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000004c0)=""/27) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000480)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000500)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000240), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={@loopback, @multicast2}, &(0x7f0000000380)=0xc) 03:39:16 executing program 4: clock_gettime(0x0, &(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) syz_execute_func(&(0x7f0000000140)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:39:17 executing program 1: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000006c0)) eventfd2(0x0, 0x0) epoll_create1(0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@multicast2, @loopback, @local}, 0xc) syz_execute_func(&(0x7f0000000240)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fececd0d01a01460f01ee31a3b786e69836f246af") socket$unix(0x1, 0x0, 0x0) eventfd2(0x0, 0x0) getpgrp(0x0) fcntl$getown(0xffffffffffffffff, 0x9) tgkill(0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000004280)) recvmmsg(0xffffffffffffffff, &(0x7f00000040c0), 0x0, 0x0, &(0x7f00000042c0)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000004300)={@mcast2}, 0x14) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000740)='rxrpc_s\x00', &(0x7f0000000780), &(0x7f00000007c0), 0x0, 0x0) request_key(&(0x7f0000000540)='blacklist\x00', &(0x7f00000004c0), &(0x7f0000000580)='team0\x00', 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000007c0)="805da051cfef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143264663666440f383a1bc4214dfb5279ba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:39:17 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x2, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) ppoll(&(0x7f0000000000), 0x0, &(0x7f00000002c0), &(0x7f0000000240), 0x8) unshare(0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000280)) getpid() openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000200)) 03:39:17 executing program 4: clock_gettime(0x0, &(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) syz_execute_func(&(0x7f0000000140)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 1165.161379] audit: type=1326 audit(2000000357.879:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7726 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:39:18 executing program 5: semget$private(0x0, 0x7d00, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000001740)=""/4096) unshare(0x0) futex(&(0x7f00000003c0), 0x9, 0x0, &(0x7f00000004c0)={0x77359400}, &(0x7f0000000500), 0x0) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000340), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0)) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000200)) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000240)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) fstat(0xffffffffffffffff, &(0x7f0000000440)) ioprio_get$uid(0x0, 0x0) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000180)) accept4$unix(0xffffffffffffff9c, &(0x7f0000000540), &(0x7f0000000380)=0x6e, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000640)) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") socket$bt_bnep(0x1f, 0x3, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) 03:39:18 executing program 1: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000006c0)) eventfd2(0x0, 0x0) epoll_create1(0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@multicast2, @loopback, @local}, 0xc) syz_execute_func(&(0x7f0000000240)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fececd0d01a01460f01ee31a3b786e69836f246af") socket$unix(0x1, 0x0, 0x0) eventfd2(0x0, 0x0) getpgrp(0x0) fcntl$getown(0xffffffffffffffff, 0x9) tgkill(0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000004280)) recvmmsg(0xffffffffffffffff, &(0x7f00000040c0), 0x0, 0x0, &(0x7f00000042c0)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000004300)={@mcast2}, 0x14) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000740)='rxrpc_s\x00', &(0x7f0000000780), &(0x7f00000007c0), 0x0, 0x0) request_key(&(0x7f0000000540)='blacklist\x00', &(0x7f00000004c0), &(0x7f0000000580)='team0\x00', 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000007c0)="805da051cfef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143264663666440f383a1bc4214dfb5279ba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1165.663690] audit: type=1326 audit(2000000358.449:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7743 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 1166.531949] bridge0: port 1(bridge_slave_0) entered blocking state [ 1166.538421] bridge0: port 1(bridge_slave_0) entered disabled state [ 1166.545468] device bridge_slave_0 entered promiscuous mode [ 1166.615161] bridge0: port 2(bridge_slave_1) entered blocking state [ 1166.621732] bridge0: port 2(bridge_slave_1) entered disabled state [ 1166.628684] device bridge_slave_1 entered promiscuous mode [ 1166.655505] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1166.726074] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1166.831848] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1166.876883] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1167.125125] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1167.132679] team0: Port device team_slave_0 added [ 1167.159628] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1167.167182] team0: Port device team_slave_1 added [ 1167.216748] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1167.245542] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1167.336916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1167.365330] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1167.372725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1167.380610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1167.673943] device bridge_slave_1 left promiscuous mode [ 1167.679465] bridge0: port 2(bridge_slave_1) entered disabled state [ 1167.732024] device bridge_slave_0 left promiscuous mode [ 1167.737507] bridge0: port 1(bridge_slave_0) entered disabled state [ 1167.820115] team0 (unregistering): Port device team_slave_1 removed [ 1167.830034] team0 (unregistering): Port device team_slave_0 removed [ 1167.839882] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1167.856626] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1167.942955] bond0 (unregistering): Released all slaves [ 1168.073548] bridge0: port 2(bridge_slave_1) entered blocking state [ 1168.079923] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1168.086641] bridge0: port 1(bridge_slave_0) entered blocking state [ 1168.093025] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1168.100187] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1168.341709] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1169.625821] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1169.763124] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1169.850612] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1169.857435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1169.865146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1169.955210] 8021q: adding VLAN 0 to HW filter on device team0 03:39:23 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x2, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) ppoll(&(0x7f0000000000), 0x0, &(0x7f00000002c0), &(0x7f0000000240), 0x8) unshare(0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000280)) getpid() openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000200)) 03:39:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x20004e20}, 0x1c) listen(r1, 0x0) accept4(r1, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80, 0x0) shutdown(r1, 0x0) 03:39:23 executing program 3: prctl$setmm(0x2f, 0x0, &(0x7f0000ffd000/0x1000)=nil) add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffff9) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000006c0)) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000002800)) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, &(0x7f00000028c0)={0x0, 0x0, 0x2080}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300), &(0x7f0000000340), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002300), &(0x7f0000002340)=0x14, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006640), 0x0, 0x0, &(0x7f0000006700)={0x0, 0x989680}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006d40)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000006e40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006ec0)={{{@in6=@mcast2}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000006fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007000)={'vcan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009840), 0x0, 0x0, &(0x7f00000098c0)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009940)={@remote}, &(0x7f0000009980)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ac40)={{{@in=@remote, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000ad40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ae80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000aec0)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000b440)={{{@in6, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f000000b540)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000b580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000b5c0)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b640)={{{@in=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b780)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f000000b880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b8c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b900)={'team0\x00'}) clock_gettime(0x0, &(0x7f0000000440)) recvmmsg(0xffffffffffffffff, &(0x7f000000bbc0), 0x0, 0x0, &(0x7f000000bc40)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bc80)={@mcast1}, &(0x7f000000bcc0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000bd00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000bd40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000bd80)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000be80), &(0x7f000000bec0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000bf00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000bf40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000bf80)={'gretap0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:39:23 executing program 4: semget$private(0x0, 0x7d00, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000001740)=""/4096) unshare(0x0) futex(&(0x7f00000003c0), 0x9, 0x0, &(0x7f00000004c0)={0x77359400}, &(0x7f0000000500), 0x0) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000340), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0)) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000200)) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000240)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) fstat(0xffffffffffffffff, &(0x7f0000000440)) ioprio_get$uid(0x0, 0x0) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000180)) accept4$unix(0xffffffffffffff9c, &(0x7f0000000540), &(0x7f0000000380)=0x6e, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000640)) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") socket$bt_bnep(0x1f, 0x3, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) 03:39:23 executing program 1: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000006c0)) eventfd2(0x0, 0x0) epoll_create1(0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@multicast2, @loopback, @local}, 0xc) syz_execute_func(&(0x7f0000000240)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fececd0d01a01460f01ee31a3b786e69836f246af") socket$unix(0x1, 0x0, 0x0) eventfd2(0x0, 0x0) getpgrp(0x0) fcntl$getown(0xffffffffffffffff, 0x9) tgkill(0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000004280)) recvmmsg(0xffffffffffffffff, &(0x7f00000040c0), 0x0, 0x0, &(0x7f00000042c0)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000004300)={@mcast2}, 0x14) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000740)='rxrpc_s\x00', &(0x7f0000000780), &(0x7f00000007c0), 0x0, 0x0) request_key(&(0x7f0000000540)='blacklist\x00', &(0x7f00000004c0), &(0x7f0000000580)='team0\x00', 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000007c0)="805da051cfef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143264663666440f383a1bc4214dfb5279ba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:39:23 executing program 5: semget$private(0x0, 0x7d00, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000001740)=""/4096) unshare(0x0) futex(&(0x7f00000003c0), 0x9, 0x0, &(0x7f00000004c0)={0x77359400}, &(0x7f0000000500), 0x0) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000340), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0)) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000200)) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000240)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) fstat(0xffffffffffffffff, &(0x7f0000000440)) ioprio_get$uid(0x0, 0x0) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000180)) accept4$unix(0xffffffffffffff9c, &(0x7f0000000540), &(0x7f0000000380)=0x6e, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000640)) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") socket$bt_bnep(0x1f, 0x3, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) 03:39:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x20004e20}, 0x1c) listen(r1, 0x0) accept4(r1, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80, 0x0) shutdown(r1, 0x0) 03:39:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x20004e20}, 0x1c) listen(r1, 0x0) accept4(r1, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80, 0x0) shutdown(r1, 0x0) [ 1170.818871] audit: type=1326 audit(2000000363.599:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8006 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:39:23 executing program 0: clock_gettime(0x5, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440), 0xc, &(0x7f0000000880), 0x0, &(0x7f0000000d80)}, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)="b1b26ce7d75f55f8b9bb6c3fd1f9242e2f6367726f006968", 0x200002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:39:24 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x2, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) ppoll(&(0x7f0000000000), 0x0, &(0x7f00000002c0), &(0x7f0000000240), 0x8) unshare(0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000280)) getpid() openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000200)) 03:39:24 executing program 3: prctl$setmm(0x2f, 0x0, &(0x7f0000ffd000/0x1000)=nil) add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffff9) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000006c0)) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000002800)) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, &(0x7f00000028c0)={0x0, 0x0, 0x2080}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300), &(0x7f0000000340), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002300), &(0x7f0000002340)=0x14, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006640), 0x0, 0x0, &(0x7f0000006700)={0x0, 0x989680}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006d40)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000006e40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006ec0)={{{@in6=@mcast2}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000006fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007000)={'vcan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009840), 0x0, 0x0, &(0x7f00000098c0)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009940)={@remote}, &(0x7f0000009980)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ac40)={{{@in=@remote, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000ad40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ae80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000aec0)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000b440)={{{@in6, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f000000b540)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000b580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000b5c0)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b640)={{{@in=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b780)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f000000b880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b8c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b900)={'team0\x00'}) clock_gettime(0x0, &(0x7f0000000440)) recvmmsg(0xffffffffffffffff, &(0x7f000000bbc0), 0x0, 0x0, &(0x7f000000bc40)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bc80)={@mcast1}, &(0x7f000000bcc0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000bd00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000bd40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000bd80)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000be80), &(0x7f000000bec0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000bf00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000bf40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000bf80)={'gretap0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:39:24 executing program 1: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000006c0)) eventfd2(0x0, 0x0) epoll_create1(0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@multicast2, @loopback, @local}, 0xc) syz_execute_func(&(0x7f0000000240)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fececd0d01a01460f01ee31a3b786e69836f246af") socket$unix(0x1, 0x0, 0x0) eventfd2(0x0, 0x0) getpgrp(0x0) fcntl$getown(0xffffffffffffffff, 0x9) tgkill(0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000004280)) recvmmsg(0xffffffffffffffff, &(0x7f00000040c0), 0x0, 0x0, &(0x7f00000042c0)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000004300)={@mcast2}, 0x14) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000740)='rxrpc_s\x00', &(0x7f0000000780), &(0x7f00000007c0), 0x0, 0x0) request_key(&(0x7f0000000540)='blacklist\x00', &(0x7f00000004c0), &(0x7f0000000580)='team0\x00', 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000007c0)="805da051cfef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143264663666440f383a1bc4214dfb5279ba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:39:24 executing program 5: semget$private(0x0, 0x7d00, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000001740)=""/4096) unshare(0x0) futex(&(0x7f00000003c0), 0x9, 0x0, &(0x7f00000004c0)={0x77359400}, &(0x7f0000000500), 0x0) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000340), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0)) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000200)) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000240)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) fstat(0xffffffffffffffff, &(0x7f0000000440)) ioprio_get$uid(0x0, 0x0) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000180)) accept4$unix(0xffffffffffffff9c, &(0x7f0000000540), &(0x7f0000000380)=0x6e, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000640)) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") socket$bt_bnep(0x1f, 0x3, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) 03:39:24 executing program 4: semget$private(0x0, 0x7d00, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000001740)=""/4096) unshare(0x0) futex(&(0x7f00000003c0), 0x9, 0x0, &(0x7f00000004c0)={0x77359400}, &(0x7f0000000500), 0x0) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000340), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0)) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000200)) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000240)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) fstat(0xffffffffffffffff, &(0x7f0000000440)) ioprio_get$uid(0x0, 0x0) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000180)) accept4$unix(0xffffffffffffff9c, &(0x7f0000000540), &(0x7f0000000380)=0x6e, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000640)) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") socket$bt_bnep(0x1f, 0x3, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) [ 1171.755818] audit: type=1326 audit(2000000364.529:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8037 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:39:24 executing program 0: clock_gettime(0x5, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440), 0xc, &(0x7f0000000880), 0x0, &(0x7f0000000d80)}, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)="b1b26ce7d75f55f8b9bb6c3fd1f9242e2f6367726f006968", 0x200002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:39:25 executing program 3: prctl$setmm(0x2f, 0x0, &(0x7f0000ffd000/0x1000)=nil) add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffff9) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000006c0)) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000002800)) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, &(0x7f00000028c0)={0x0, 0x0, 0x2080}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300), &(0x7f0000000340), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002300), &(0x7f0000002340)=0x14, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006640), 0x0, 0x0, &(0x7f0000006700)={0x0, 0x989680}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006d40)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000006e40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006ec0)={{{@in6=@mcast2}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000006fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007000)={'vcan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009840), 0x0, 0x0, &(0x7f00000098c0)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009940)={@remote}, &(0x7f0000009980)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ac40)={{{@in=@remote, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000ad40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ae80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000aec0)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000b440)={{{@in6, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f000000b540)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000b580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000b5c0)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b640)={{{@in=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b780)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f000000b880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b8c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b900)={'team0\x00'}) clock_gettime(0x0, &(0x7f0000000440)) recvmmsg(0xffffffffffffffff, &(0x7f000000bbc0), 0x0, 0x0, &(0x7f000000bc40)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bc80)={@mcast1}, &(0x7f000000bcc0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000bd00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000bd40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000bd80)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000be80), &(0x7f000000bec0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000bf00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000bf40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000bf80)={'gretap0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:39:25 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x2, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) ppoll(&(0x7f0000000000), 0x0, &(0x7f00000002c0), &(0x7f0000000240), 0x8) unshare(0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000280)) getpid() openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000200)) 03:39:25 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) syz_execute_func(&(0x7f00000004c0)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4e19086d90dba8fc9c90feefa4e2179fbe5e565f247af0f2e1ac4010d64ac1e5d31a3b706f08024030866430ff5e04b") 03:39:25 executing program 5: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140), &(0x7f0000000180)='/dev/ppp\x00', 0xfffffffffffffff8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='io.bfq.weight\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b73e0f12cf9f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000080)={0x8}, 0x8) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 03:39:25 executing program 4: semget$private(0x0, 0x7d00, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000001740)=""/4096) unshare(0x0) futex(&(0x7f00000003c0), 0x9, 0x0, &(0x7f00000004c0)={0x77359400}, &(0x7f0000000500), 0x0) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000340), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0)) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000200)) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000240)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) fstat(0xffffffffffffffff, &(0x7f0000000440)) ioprio_get$uid(0x0, 0x0) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000180)) accept4$unix(0xffffffffffffff9c, &(0x7f0000000540), &(0x7f0000000380)=0x6e, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000640)) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") socket$bt_bnep(0x1f, 0x3, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) 03:39:25 executing program 0: clock_gettime(0x5, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440), 0xc, &(0x7f0000000880), 0x0, &(0x7f0000000d80)}, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)="b1b26ce7d75f55f8b9bb6c3fd1f9242e2f6367726f006968", 0x200002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:39:26 executing program 3: prctl$setmm(0x2f, 0x0, &(0x7f0000ffd000/0x1000)=nil) add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffff9) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000006c0)) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000002800)) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, &(0x7f00000028c0)={0x0, 0x0, 0x2080}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300), &(0x7f0000000340), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002300), &(0x7f0000002340)=0x14, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006640), 0x0, 0x0, &(0x7f0000006700)={0x0, 0x989680}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006d40)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000006e40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006ec0)={{{@in6=@mcast2}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000006fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007000)={'vcan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009840), 0x0, 0x0, &(0x7f00000098c0)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009940)={@remote}, &(0x7f0000009980)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ac40)={{{@in=@remote, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000ad40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ae80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000aec0)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000b440)={{{@in6, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f000000b540)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000b580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000b5c0)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b640)={{{@in=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b780)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f000000b880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b8c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b900)={'team0\x00'}) clock_gettime(0x0, &(0x7f0000000440)) recvmmsg(0xffffffffffffffff, &(0x7f000000bbc0), 0x0, 0x0, &(0x7f000000bc40)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bc80)={@mcast1}, &(0x7f000000bcc0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000bd00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000bd40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000bd80)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000be80), &(0x7f000000bec0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000bf00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000bf40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000bf80)={'gretap0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:39:26 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) syz_execute_func(&(0x7f00000004c0)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4e19086d90dba8fc9c90feefa4e2179fbe5e565f247af0f2e1ac4010d64ac1e5d31a3b706f08024030866430ff5e04b") 03:39:26 executing program 2: keyctl$set_reqkey_keyring(0x10, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) getrusage(0x0, &(0x7f0000000b40)) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000002c0)={0x0, @local, @local}, &(0x7f0000000440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'ip6tnl0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@loopback, @in=@broadcast}}, {{}, 0x0, @in=@local}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000d00)={@mcast2}, &(0x7f0000000e00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e40)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000e80)={@dev, @dev}, &(0x7f0000000ec0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f40)={{{@in=@multicast2, @in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000001040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001080)={0x0, @dev}, &(0x7f00000010c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001100)={{{@in=@local, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001200)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001240)={@dev, @local}, &(0x7f0000001280)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001380)=0x14) 03:39:26 executing program 5: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140), &(0x7f0000000180)='/dev/ppp\x00', 0xfffffffffffffff8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='io.bfq.weight\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b73e0f12cf9f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000080)={0x8}, 0x8) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 03:39:26 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/123, &(0x7f0000000280)=0x7b) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) getrusage(0x0, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='hybla\x00', 0x6) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) flistxattr(0xffffffffffffffff, &(0x7f00000004c0)=""/88, 0x58) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0xccb64, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 03:39:26 executing program 0: clock_gettime(0x5, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440), 0xc, &(0x7f0000000880), 0x0, &(0x7f0000000d80)}, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)="b1b26ce7d75f55f8b9bb6c3fd1f9242e2f6367726f006968", 0x200002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:39:26 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/123, &(0x7f0000000280)=0x7b) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) getrusage(0x0, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='hybla\x00', 0x6) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) flistxattr(0xffffffffffffffff, &(0x7f00000004c0)=""/88, 0x58) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0xccb64, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 03:39:27 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) syz_execute_func(&(0x7f00000004c0)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4e19086d90dba8fc9c90feefa4e2179fbe5e565f247af0f2e1ac4010d64ac1e5d31a3b706f08024030866430ff5e04b") 03:39:27 executing program 3: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040), 0x2) 03:39:27 executing program 2: keyctl$set_reqkey_keyring(0x10, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) getrusage(0x0, &(0x7f0000000b40)) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000002c0)={0x0, @local, @local}, &(0x7f0000000440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'ip6tnl0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@loopback, @in=@broadcast}}, {{}, 0x0, @in=@local}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000d00)={@mcast2}, &(0x7f0000000e00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e40)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000e80)={@dev, @dev}, &(0x7f0000000ec0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f40)={{{@in=@multicast2, @in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000001040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001080)={0x0, @dev}, &(0x7f00000010c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001100)={{{@in=@local, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001200)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001240)={@dev, @local}, &(0x7f0000001280)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001380)=0x14) 03:39:27 executing program 5: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140), &(0x7f0000000180)='/dev/ppp\x00', 0xfffffffffffffff8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='io.bfq.weight\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b73e0f12cf9f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000080)={0x8}, 0x8) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 03:39:27 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/123, &(0x7f0000000280)=0x7b) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) getrusage(0x0, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='hybla\x00', 0x6) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) flistxattr(0xffffffffffffffff, &(0x7f00000004c0)=""/88, 0x58) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0xccb64, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 03:39:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x4, 0x4, 0x8000000000009, 0x12, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) 03:39:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x4, 0x4, 0x8000000000009, 0x12, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) 03:39:27 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) syz_execute_func(&(0x7f00000004c0)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4e19086d90dba8fc9c90feefa4e2179fbe5e565f247af0f2e1ac4010d64ac1e5d31a3b706f08024030866430ff5e04b") 03:39:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x4, 0x4, 0x8000000000009, 0x12, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) 03:39:28 executing program 2: keyctl$set_reqkey_keyring(0x10, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) getrusage(0x0, &(0x7f0000000b40)) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000002c0)={0x0, @local, @local}, &(0x7f0000000440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'ip6tnl0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@loopback, @in=@broadcast}}, {{}, 0x0, @in=@local}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000d00)={@mcast2}, &(0x7f0000000e00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e40)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000e80)={@dev, @dev}, &(0x7f0000000ec0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f40)={{{@in=@multicast2, @in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000001040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001080)={0x0, @dev}, &(0x7f00000010c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001100)={{{@in=@local, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001200)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001240)={@dev, @local}, &(0x7f0000001280)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001380)=0x14) 03:39:28 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/123, &(0x7f0000000280)=0x7b) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) getrusage(0x0, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='hybla\x00', 0x6) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) flistxattr(0xffffffffffffffff, &(0x7f00000004c0)=""/88, 0x58) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0xccb64, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 03:39:28 executing program 5: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140), &(0x7f0000000180)='/dev/ppp\x00', 0xfffffffffffffff8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='io.bfq.weight\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b73e0f12cf9f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000080)={0x8}, 0x8) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 03:39:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x4, 0x4, 0x8000000000009, 0x12, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) 03:39:28 executing program 3: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040), 0x2) 03:39:28 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000000c0)=""/113) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value, &(0x7f0000000400)=0x8) dup(0xffffffffffffffff) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000280)=0x1e) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") socket$vsock_dgram(0x28, 0x2, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000780)=0xc) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001b40)) stat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpid() 03:39:28 executing program 3: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040), 0x2) 03:39:28 executing program 4: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040), 0x2) 03:39:28 executing program 1: keyctl$set_reqkey_keyring(0xf, 0xffffffffffffffff) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000003c0)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000400)=0xc) migrate_pages(0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)={0x0, @remote, 0x0, 0x0, 'nq\x00'}, 0x2c) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)=""/33, &(0x7f00000002c0)=0x21) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f00000004c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:39:28 executing program 2: keyctl$set_reqkey_keyring(0x10, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) getrusage(0x0, &(0x7f0000000b40)) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000002c0)={0x0, @local, @local}, &(0x7f0000000440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'ip6tnl0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@loopback, @in=@broadcast}}, {{}, 0x0, @in=@local}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000d00)={@mcast2}, &(0x7f0000000e00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e40)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000e80)={@dev, @dev}, &(0x7f0000000ec0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f40)={{{@in=@multicast2, @in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000001040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001080)={0x0, @dev}, &(0x7f00000010c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001100)={{{@in=@local, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001200)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001240)={@dev, @local}, &(0x7f0000001280)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001380)=0x14) 03:39:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0x7f}, 0x4) close(r0) 03:39:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0x7f}, 0x4) close(r0) 03:39:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0x7f}, 0x4) close(r0) 03:39:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0x7f}, 0x4) close(r0) 03:39:29 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000000c0)=""/113) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value, &(0x7f0000000400)=0x8) dup(0xffffffffffffffff) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000280)=0x1e) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") socket$vsock_dgram(0x28, 0x2, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000780)=0xc) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001b40)) stat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpid() 03:39:29 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00005a5000)={&(0x7f000059fff4), 0xc, &(0x7f0000007000)={&(0x7f0000070000)={0x28, 0x1c, 0x109, 0x0, 0x0, {0x40000001}, [@nested={0x14, 0x2, [@typed={0x10, 0x0, @u64}]}]}, 0x28}}, 0x0) 03:39:29 executing program 4: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040), 0x2) 03:39:29 executing program 3: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040), 0x2) 03:39:29 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00005a5000)={&(0x7f000059fff4), 0xc, &(0x7f0000007000)={&(0x7f0000070000)={0x28, 0x1c, 0x109, 0x0, 0x0, {0x40000001}, [@nested={0x14, 0x2, [@typed={0x10, 0x0, @u64}]}]}, 0x28}}, 0x0) 03:39:29 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00005a5000)={&(0x7f000059fff4), 0xc, &(0x7f0000007000)={&(0x7f0000070000)={0x28, 0x1c, 0x109, 0x0, 0x0, {0x40000001}, [@nested={0x14, 0x2, [@typed={0x10, 0x0, @u64}]}]}, 0x28}}, 0x0) 03:39:29 executing program 1: keyctl$set_reqkey_keyring(0xf, 0xffffffffffffffff) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000003c0)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000400)=0xc) migrate_pages(0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)={0x0, @remote, 0x0, 0x0, 'nq\x00'}, 0x2c) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)=""/33, &(0x7f00000002c0)=0x21) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f00000004c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:39:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), 0x269) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x0, 0x0, &(0x7f0000e68000), 0x10) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0, &(0x7f00000014c0)={0x77359400}) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000d80)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) stat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000f00)) fstat(0xffffffffffffffff, &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001000)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001080)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) stat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)) getgroups(0x0, &(0x7f0000001540)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003dc0)={{{@in6, @in6}}, {{}, 0x0, @in6=@local}}, &(0x7f0000003ec0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003f00)) fstat(0xffffffffffffffff, &(0x7f0000003f40)) fstat(0xffffffffffffffff, &(0x7f0000003fc0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004080)={{{@in6=@local, @in=@dev}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000004180)=0xe8) getresgid(&(0x7f00000041c0), &(0x7f0000004200), &(0x7f0000004240)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6=@local, @in6=@loopback}}, {{@in=@local}}}, &(0x7f0000004580)=0xe8) lstat(&(0x7f00000045c0)='\x00', &(0x7f0000004600)) getpgrp(0x0) lstat(&(0x7f0000004680)='./file0\x00', &(0x7f00000046c0)) getgroups(0x0, &(0x7f0000004740)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004a40)) fstat(0xffffffffffffffff, &(0x7f0000004a80)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004b00)) lstat(&(0x7f0000004b40)='./file0\x00', &(0x7f0000004b80)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c40), &(0x7f0000004c80)=0xc) lstat(&(0x7f0000004cc0)='./file0\x00', &(0x7f0000004d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004d80)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:39:29 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00005a5000)={&(0x7f000059fff4), 0xc, &(0x7f0000007000)={&(0x7f0000070000)={0x28, 0x1c, 0x109, 0x0, 0x0, {0x40000001}, [@nested={0x14, 0x2, [@typed={0x10, 0x0, @u64}]}]}, 0x28}}, 0x0) 03:39:30 executing program 5: get_mempolicy(&(0x7f00000000c0), &(0x7f0000000140), 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x0) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0ff009730aae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") pipe2(&(0x7f0000000240), 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000280)) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000300)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) 03:39:30 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000000c0)=""/113) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value, &(0x7f0000000400)=0x8) dup(0xffffffffffffffff) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000280)=0x1e) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") socket$vsock_dgram(0x28, 0x2, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000780)=0xc) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001b40)) stat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpid() 03:39:30 executing program 3: clock_gettime(0xb, &(0x7f0000002dc0)) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000240), 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001b00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001b40)={{{@in6, @in6=@local}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001c40)=0xe8) getegid() accept4$inet(0xffffffffffffffff, &(0x7f0000001c80), &(0x7f0000001cc0)=0x10, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001e80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001e40)='/dev/full\x00', 0xffffffffffffffff}, 0x30) getuid() getgid() clock_gettime(0x0, &(0x7f0000002a40)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000064c0), 0x10) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) stat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002000)) getuid() lstat(&(0x7f0000002040)='./file0\x00', &(0x7f0000002080)) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000140)="c46219ae80875e00008055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d643ef85d31a3b786e2989fe8") 03:39:30 executing program 4: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffe}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040), 0x2) 03:39:30 executing program 4: gettid() syz_open_procfs(0x0, &(0x7f0000000040)='net/mes\x00') accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getuid() lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x0) setfsuid(0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@multicast1, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bd00)={{{@in=@local, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000780)=0xfffffffffffffdf5) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'bond_slave_0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f00000009c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000c40)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000003140)={&(0x7f0000000d40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f00000030c0)}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003180)={@mcast2}, &(0x7f00000031c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003200)={@ipv4={[], [], @dev}}, &(0x7f0000003240)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003280)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003340), &(0x7f0000003380)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000003540)={&(0x7f00000033c0)=@hci, 0x80, &(0x7f0000003440), 0x0, &(0x7f0000003480)=""/186, 0xba}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)={@local, @broadcast}, &(0x7f00000035c0)=0xfffffffffffffded) clock_gettime(0x0, &(0x7f000000b080)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:39:30 executing program 1: keyctl$set_reqkey_keyring(0xf, 0xffffffffffffffff) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000003c0)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000400)=0xc) migrate_pages(0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)={0x0, @remote, 0x0, 0x0, 'nq\x00'}, 0x2c) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)=""/33, &(0x7f00000002c0)=0x21) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f00000004c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:39:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), 0x269) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x0, 0x0, &(0x7f0000e68000), 0x10) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0, &(0x7f00000014c0)={0x77359400}) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000d80)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) stat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000f00)) fstat(0xffffffffffffffff, &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001000)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001080)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) stat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)) getgroups(0x0, &(0x7f0000001540)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003dc0)={{{@in6, @in6}}, {{}, 0x0, @in6=@local}}, &(0x7f0000003ec0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003f00)) fstat(0xffffffffffffffff, &(0x7f0000003f40)) fstat(0xffffffffffffffff, &(0x7f0000003fc0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004080)={{{@in6=@local, @in=@dev}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000004180)=0xe8) getresgid(&(0x7f00000041c0), &(0x7f0000004200), &(0x7f0000004240)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6=@local, @in6=@loopback}}, {{@in=@local}}}, &(0x7f0000004580)=0xe8) lstat(&(0x7f00000045c0)='\x00', &(0x7f0000004600)) getpgrp(0x0) lstat(&(0x7f0000004680)='./file0\x00', &(0x7f00000046c0)) getgroups(0x0, &(0x7f0000004740)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004a40)) fstat(0xffffffffffffffff, &(0x7f0000004a80)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004b00)) lstat(&(0x7f0000004b40)='./file0\x00', &(0x7f0000004b80)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c40), &(0x7f0000004c80)=0xc) lstat(&(0x7f0000004cc0)='./file0\x00', &(0x7f0000004d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004d80)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:39:31 executing program 5: get_mempolicy(&(0x7f00000000c0), &(0x7f0000000140), 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x0) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0ff009730aae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") pipe2(&(0x7f0000000240), 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000280)) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000300)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) 03:39:31 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000000c0)=""/113) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value, &(0x7f0000000400)=0x8) dup(0xffffffffffffffff) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000280)=0x1e) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") socket$vsock_dgram(0x28, 0x2, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000780)=0xc) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001b40)) stat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpid() 03:39:31 executing program 3: clock_gettime(0xb, &(0x7f0000002dc0)) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000240), 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001b00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001b40)={{{@in6, @in6=@local}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001c40)=0xe8) getegid() accept4$inet(0xffffffffffffffff, &(0x7f0000001c80), &(0x7f0000001cc0)=0x10, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001e80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001e40)='/dev/full\x00', 0xffffffffffffffff}, 0x30) getuid() getgid() clock_gettime(0x0, &(0x7f0000002a40)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000064c0), 0x10) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) stat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002000)) getuid() lstat(&(0x7f0000002040)='./file0\x00', &(0x7f0000002080)) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000140)="c46219ae80875e00008055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d643ef85d31a3b786e2989fe8") 03:39:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), 0x269) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x0, 0x0, &(0x7f0000e68000), 0x10) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0, &(0x7f00000014c0)={0x77359400}) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000d80)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) stat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000f00)) fstat(0xffffffffffffffff, &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001000)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001080)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) stat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)) getgroups(0x0, &(0x7f0000001540)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003dc0)={{{@in6, @in6}}, {{}, 0x0, @in6=@local}}, &(0x7f0000003ec0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003f00)) fstat(0xffffffffffffffff, &(0x7f0000003f40)) fstat(0xffffffffffffffff, &(0x7f0000003fc0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004080)={{{@in6=@local, @in=@dev}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000004180)=0xe8) getresgid(&(0x7f00000041c0), &(0x7f0000004200), &(0x7f0000004240)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6=@local, @in6=@loopback}}, {{@in=@local}}}, &(0x7f0000004580)=0xe8) lstat(&(0x7f00000045c0)='\x00', &(0x7f0000004600)) getpgrp(0x0) lstat(&(0x7f0000004680)='./file0\x00', &(0x7f00000046c0)) getgroups(0x0, &(0x7f0000004740)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004a40)) fstat(0xffffffffffffffff, &(0x7f0000004a80)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004b00)) lstat(&(0x7f0000004b40)='./file0\x00', &(0x7f0000004b80)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c40), &(0x7f0000004c80)=0xc) lstat(&(0x7f0000004cc0)='./file0\x00', &(0x7f0000004d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004d80)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:39:32 executing program 1: keyctl$set_reqkey_keyring(0xf, 0xffffffffffffffff) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000003c0)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000400)=0xc) migrate_pages(0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)={0x0, @remote, 0x0, 0x0, 'nq\x00'}, 0x2c) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)=""/33, &(0x7f00000002c0)=0x21) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) ioctl$sock_bt(0xffffffffffffffff, 0x0, &(0x7f00000004c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:39:32 executing program 5: get_mempolicy(&(0x7f00000000c0), &(0x7f0000000140), 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x0) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0ff009730aae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") pipe2(&(0x7f0000000240), 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000280)) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000300)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) 03:39:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000001, 0x549080) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) syz_open_dev$sndtimer(&(0x7f00000007c0)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x105082) prctl$setfpexc(0xc, 0x0) bind$rds(r0, &(0x7f0000000740)={0x2, 0x4e24, @remote}, 0x10) tgkill(0x0, 0x0, 0x3) r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x7, 0x24a001) r3 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000380)={0x7fffffff, 0xffff}) sendfile(0xffffffffffffffff, r1, &(0x7f00000ddff8), 0x102000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000200)) r7 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x92800) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000180)={0x0, @empty, 0x4e21, 0x3, 'ovf\x00', 0x20, 0x9, 0x59}, 0x356) getsockopt$sock_buf(r4, 0x1, 0x1f, &(0x7f00000000c0)=""/75, &(0x7f0000000040)=0x4b) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) ioctl$VT_ACTIVATE(r7, 0x5606, 0x0) 03:39:32 executing program 4: gettid() syz_open_procfs(0x0, &(0x7f0000000040)='net/mes\x00') accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getuid() lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x0) setfsuid(0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@multicast1, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bd00)={{{@in=@local, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000780)=0xfffffffffffffdf5) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'bond_slave_0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f00000009c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000c40)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000003140)={&(0x7f0000000d40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f00000030c0)}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003180)={@mcast2}, &(0x7f00000031c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003200)={@ipv4={[], [], @dev}}, &(0x7f0000003240)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003280)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003340), &(0x7f0000003380)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000003540)={&(0x7f00000033c0)=@hci, 0x80, &(0x7f0000003440), 0x0, &(0x7f0000003480)=""/186, 0xba}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)={@local, @broadcast}, &(0x7f00000035c0)=0xfffffffffffffded) clock_gettime(0x0, &(0x7f000000b080)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:39:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000001, 0x549080) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) syz_open_dev$sndtimer(&(0x7f00000007c0)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x105082) prctl$setfpexc(0xc, 0x0) bind$rds(r0, &(0x7f0000000740)={0x2, 0x4e24, @remote}, 0x10) tgkill(0x0, 0x0, 0x3) r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x7, 0x24a001) r3 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000380)={0x7fffffff, 0xffff}) sendfile(0xffffffffffffffff, r1, &(0x7f00000ddff8), 0x102000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000200)) r7 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x92800) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000180)={0x0, @empty, 0x4e21, 0x3, 'ovf\x00', 0x20, 0x9, 0x59}, 0x356) getsockopt$sock_buf(r4, 0x1, 0x1f, &(0x7f00000000c0)=""/75, &(0x7f0000000040)=0x4b) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) ioctl$VT_ACTIVATE(r7, 0x5606, 0x0) 03:39:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000001, 0x549080) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) syz_open_dev$sndtimer(&(0x7f00000007c0)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x105082) prctl$setfpexc(0xc, 0x0) bind$rds(r0, &(0x7f0000000740)={0x2, 0x4e24, @remote}, 0x10) tgkill(0x0, 0x0, 0x3) r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x7, 0x24a001) r3 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000380)={0x7fffffff, 0xffff}) sendfile(0xffffffffffffffff, r1, &(0x7f00000ddff8), 0x102000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000200)) r7 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x92800) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000180)={0x0, @empty, 0x4e21, 0x3, 'ovf\x00', 0x20, 0x9, 0x59}, 0x356) getsockopt$sock_buf(r4, 0x1, 0x1f, &(0x7f00000000c0)=""/75, &(0x7f0000000040)=0x4b) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) ioctl$VT_ACTIVATE(r7, 0x5606, 0x0) 03:39:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000001, 0x549080) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) syz_open_dev$sndtimer(&(0x7f00000007c0)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x105082) prctl$setfpexc(0xc, 0x0) bind$rds(r0, &(0x7f0000000740)={0x2, 0x4e24, @remote}, 0x10) tgkill(0x0, 0x0, 0x3) r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x7, 0x24a001) r3 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000380)={0x7fffffff, 0xffff}) sendfile(0xffffffffffffffff, r1, &(0x7f00000ddff8), 0x102000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000200)) r7 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x92800) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000180)={0x0, @empty, 0x4e21, 0x3, 'ovf\x00', 0x20, 0x9, 0x59}, 0x356) getsockopt$sock_buf(r4, 0x1, 0x1f, &(0x7f00000000c0)=""/75, &(0x7f0000000040)=0x4b) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) ioctl$VT_ACTIVATE(r7, 0x5606, 0x0) 03:39:32 executing program 3: clock_gettime(0xb, &(0x7f0000002dc0)) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000240), 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001b00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001b40)={{{@in6, @in6=@local}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001c40)=0xe8) getegid() accept4$inet(0xffffffffffffffff, &(0x7f0000001c80), &(0x7f0000001cc0)=0x10, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001e80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001e40)='/dev/full\x00', 0xffffffffffffffff}, 0x30) getuid() getgid() clock_gettime(0x0, &(0x7f0000002a40)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000064c0), 0x10) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) stat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002000)) getuid() lstat(&(0x7f0000002040)='./file0\x00', &(0x7f0000002080)) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000140)="c46219ae80875e00008055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d643ef85d31a3b786e2989fe8") 03:39:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000001, 0x549080) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) syz_open_dev$sndtimer(&(0x7f00000007c0)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x105082) prctl$setfpexc(0xc, 0x0) bind$rds(r0, &(0x7f0000000740)={0x2, 0x4e24, @remote}, 0x10) tgkill(0x0, 0x0, 0x3) r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x7, 0x24a001) r3 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000380)={0x7fffffff, 0xffff}) sendfile(0xffffffffffffffff, r1, &(0x7f00000ddff8), 0x102000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000200)) r7 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x92800) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000180)={0x0, @empty, 0x4e21, 0x3, 'ovf\x00', 0x20, 0x9, 0x59}, 0x356) getsockopt$sock_buf(r4, 0x1, 0x1f, &(0x7f00000000c0)=""/75, &(0x7f0000000040)=0x4b) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) ioctl$VT_ACTIVATE(r7, 0x5606, 0x0) 03:39:33 executing program 5: get_mempolicy(&(0x7f00000000c0), &(0x7f0000000140), 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x0) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0ff009730aae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") pipe2(&(0x7f0000000240), 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000280)) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000300)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) 03:39:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000001, 0x549080) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) syz_open_dev$sndtimer(&(0x7f00000007c0)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x105082) prctl$setfpexc(0xc, 0x0) bind$rds(r0, &(0x7f0000000740)={0x2, 0x4e24, @remote}, 0x10) tgkill(0x0, 0x0, 0x3) r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x7, 0x24a001) r3 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000380)={0x7fffffff, 0xffff}) sendfile(0xffffffffffffffff, r1, &(0x7f00000ddff8), 0x102000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000200)) r7 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x92800) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000180)={0x0, @empty, 0x4e21, 0x3, 'ovf\x00', 0x20, 0x9, 0x59}, 0x356) getsockopt$sock_buf(r4, 0x1, 0x1f, &(0x7f00000000c0)=""/75, &(0x7f0000000040)=0x4b) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) ioctl$VT_ACTIVATE(r7, 0x5606, 0x0) 03:39:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), 0x269) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x0, 0x0, &(0x7f0000e68000), 0x10) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0, &(0x7f00000014c0)={0x77359400}) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000d80)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) stat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000f00)) fstat(0xffffffffffffffff, &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001000)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001080)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) stat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)) getgroups(0x0, &(0x7f0000001540)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003dc0)={{{@in6, @in6}}, {{}, 0x0, @in6=@local}}, &(0x7f0000003ec0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003f00)) fstat(0xffffffffffffffff, &(0x7f0000003f40)) fstat(0xffffffffffffffff, &(0x7f0000003fc0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004080)={{{@in6=@local, @in=@dev}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000004180)=0xe8) getresgid(&(0x7f00000041c0), &(0x7f0000004200), &(0x7f0000004240)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6=@local, @in6=@loopback}}, {{@in=@local}}}, &(0x7f0000004580)=0xe8) lstat(&(0x7f00000045c0)='\x00', &(0x7f0000004600)) getpgrp(0x0) lstat(&(0x7f0000004680)='./file0\x00', &(0x7f00000046c0)) getgroups(0x0, &(0x7f0000004740)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004a40)) fstat(0xffffffffffffffff, &(0x7f0000004a80)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004b00)) lstat(&(0x7f0000004b40)='./file0\x00', &(0x7f0000004b80)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c40), &(0x7f0000004c80)=0xc) lstat(&(0x7f0000004cc0)='./file0\x00', &(0x7f0000004d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004d80)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:39:33 executing program 1: keyctl$set_reqkey_keyring(0x15, 0x2) accept4$inet6(0xffffffffffffff9c, &(0x7f0000003600)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000003640)=0x1c, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000003680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9ce41ff0f1837370f0fdaaac4c19086d9f28fc9410feefa4e2179fbe5e5c4c1e16a9901725e45c4010d64ac1e5d31a3b706e2989f3b690b5241") signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000cd8ff4)) listen(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000340)) 03:39:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000001, 0x549080) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) syz_open_dev$sndtimer(&(0x7f00000007c0)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x105082) prctl$setfpexc(0xc, 0x0) bind$rds(r0, &(0x7f0000000740)={0x2, 0x4e24, @remote}, 0x10) tgkill(0x0, 0x0, 0x3) r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x7, 0x24a001) r3 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000380)={0x7fffffff, 0xffff}) sendfile(0xffffffffffffffff, r1, &(0x7f00000ddff8), 0x102000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000200)) r7 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x92800) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000180)={0x0, @empty, 0x4e21, 0x3, 'ovf\x00', 0x20, 0x9, 0x59}, 0x356) getsockopt$sock_buf(r4, 0x1, 0x1f, &(0x7f00000000c0)=""/75, &(0x7f0000000040)=0x4b) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) ioctl$VT_ACTIVATE(r7, 0x5606, 0x0) 03:39:33 executing program 4: gettid() syz_open_procfs(0x0, &(0x7f0000000040)='net/mes\x00') accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getuid() lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x0) setfsuid(0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@multicast1, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bd00)={{{@in=@local, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000780)=0xfffffffffffffdf5) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'bond_slave_0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f00000009c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000c40)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000003140)={&(0x7f0000000d40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f00000030c0)}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003180)={@mcast2}, &(0x7f00000031c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003200)={@ipv4={[], [], @dev}}, &(0x7f0000003240)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003280)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003340), &(0x7f0000003380)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000003540)={&(0x7f00000033c0)=@hci, 0x80, &(0x7f0000003440), 0x0, &(0x7f0000003480)=""/186, 0xba}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)={@local, @broadcast}, &(0x7f00000035c0)=0xfffffffffffffded) clock_gettime(0x0, &(0x7f000000b080)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:39:33 executing program 3: clock_gettime(0xb, &(0x7f0000002dc0)) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000240), 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001b00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001b40)={{{@in6, @in6=@local}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001c40)=0xe8) getegid() accept4$inet(0xffffffffffffffff, &(0x7f0000001c80), &(0x7f0000001cc0)=0x10, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001e80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001e40)='/dev/full\x00', 0xffffffffffffffff}, 0x30) getuid() getgid() clock_gettime(0x0, &(0x7f0000002a40)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000064c0), 0x10) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) stat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002000)) getuid() lstat(&(0x7f0000002040)='./file0\x00', &(0x7f0000002080)) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000140)="c46219ae80875e00008055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d643ef85d31a3b786e2989fe8") 03:39:33 executing program 0: sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 03:39:33 executing program 5: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000300)={0x0, @rand_addr, @remote}, &(0x7f0000000340)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@dev, @in6}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000540)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000740)=@xdp, 0x80, &(0x7f0000000a80), 0x0, &(0x7f0000000ac0)=""/195, 0xc3}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000180), 0xc, &(0x7f0000000e80)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) 03:39:33 executing program 0: sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 03:39:34 executing program 0: sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 03:39:34 executing program 0: sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 03:39:34 executing program 1: keyctl$set_reqkey_keyring(0x15, 0x2) accept4$inet6(0xffffffffffffff9c, &(0x7f0000003600)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000003640)=0x1c, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000003680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9ce41ff0f1837370f0fdaaac4c19086d9f28fc9410feefa4e2179fbe5e5c4c1e16a9901725e45c4010d64ac1e5d31a3b706e2989f3b690b5241") signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000cd8ff4)) listen(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000340)) 03:39:34 executing program 4: gettid() syz_open_procfs(0x0, &(0x7f0000000040)='net/mes\x00') accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getuid() lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x0) setfsuid(0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@multicast1, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bd00)={{{@in=@local, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000780)=0xfffffffffffffdf5) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'bond_slave_0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f00000009c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000c40)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000003140)={&(0x7f0000000d40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f00000030c0)}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003180)={@mcast2}, &(0x7f00000031c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003200)={@ipv4={[], [], @dev}}, &(0x7f0000003240)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003280)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003340), &(0x7f0000003380)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000003540)={&(0x7f00000033c0)=@hci, 0x80, &(0x7f0000003440), 0x0, &(0x7f0000003480)=""/186, 0xba}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)={@local, @broadcast}, &(0x7f00000035c0)=0xfffffffffffffded) clock_gettime(0x0, &(0x7f000000b080)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:39:35 executing program 5: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000300)={0x0, @rand_addr, @remote}, &(0x7f0000000340)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@dev, @in6}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000540)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000740)=@xdp, 0x80, &(0x7f0000000a80), 0x0, &(0x7f0000000ac0)=""/195, 0xc3}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000180), 0xc, &(0x7f0000000e80)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) 03:39:35 executing program 0: getrusage(0x0, &(0x7f0000000a80)) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_getres(0x0, &(0x7f0000000000)) semget(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000140)={'veth1_to_bond\x00'}) eventfd(0x0) geteuid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000300)) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f0000000340)={{0x77359400}}, 0x0) setfsuid(0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000280)=ANY=[]) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000a00)=0xe8) syz_open_procfs(0x0, &(0x7f0000000240)='net/netfilter\x00') write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) syz_execute_func(&(0x7f0000000380)="42805da0756d6def69dc0f01eeaff241a641ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefac4e2f91dc4c482a997b7000000210f2e1a664798c44379dfb9d6adbe90dfe2989f430f5eb265566666") getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0)=""/42, &(0x7f0000000200)=0x2a) 03:39:35 executing program 3: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) eventfd(0x0) iopl(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)=0x14) uname(&(0x7f0000000080)) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:39:35 executing program 2: prctl$intptr(0x400000000004, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000440)=""/177) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000080)) shmctl$SHM_STAT(0x0, 0xd, &(0x7f00000005c0)=""/204) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000000c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:39:35 executing program 3: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) eventfd(0x0) iopl(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)=0x14) uname(&(0x7f0000000080)) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:39:35 executing program 1: keyctl$set_reqkey_keyring(0x15, 0x2) accept4$inet6(0xffffffffffffff9c, &(0x7f0000003600)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000003640)=0x1c, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000003680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9ce41ff0f1837370f0fdaaac4c19086d9f28fc9410feefa4e2179fbe5e5c4c1e16a9901725e45c4010d64ac1e5d31a3b706e2989f3b690b5241") signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000cd8ff4)) listen(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000340)) 03:39:35 executing program 3: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) eventfd(0x0) iopl(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)=0x14) uname(&(0x7f0000000080)) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:39:35 executing program 3: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) eventfd(0x0) iopl(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)=0x14) uname(&(0x7f0000000080)) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:39:36 executing program 4: getrlimit(0x0, &(0x7f0000000280)) clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000180), 0x0) epoll_create1(0x0) close(0xffffffffffffffff) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000c85000)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0610fef69dce9d92a5c6cf14132f1413237160f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5dc4a1b9e85aff7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000010c0)=ANY=[], &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000023c0)=@assoc_value, &(0x7f0000002400)=0x8) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000400), &(0x7f0000004b40)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={@ipv4={[], [], @rand_addr}}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)={@ipv4={[], [], @multicast2}}, &(0x7f0000000640)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'veth0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00)={@broadcast, @remote}, &(0x7f0000000a40)=0xc) 03:39:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x6b, 0xa, 0xff00}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x1, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 03:39:36 executing program 5: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000300)={0x0, @rand_addr, @remote}, &(0x7f0000000340)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@dev, @in6}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000540)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000740)=@xdp, 0x80, &(0x7f0000000a80), 0x0, &(0x7f0000000ac0)=""/195, 0xc3}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000180), 0xc, &(0x7f0000000e80)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) 03:39:36 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f00000003c0)={0x1, &(0x7f0000000000)=[{0x10000040000006, 0x0, 0x0, 0x58fe8}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:39:36 executing program 2: prctl$intptr(0x400000000004, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000440)=""/177) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000080)) shmctl$SHM_STAT(0x0, 0xd, &(0x7f00000005c0)=""/204) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000000c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:39:36 executing program 0: getrusage(0x0, &(0x7f0000000a80)) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_getres(0x0, &(0x7f0000000000)) semget(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000140)={'veth1_to_bond\x00'}) eventfd(0x0) geteuid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000300)) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f0000000340)={{0x77359400}}, 0x0) setfsuid(0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000280)=ANY=[]) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000a00)=0xe8) syz_open_procfs(0x0, &(0x7f0000000240)='net/netfilter\x00') write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) syz_execute_func(&(0x7f0000000380)="42805da0756d6def69dc0f01eeaff241a641ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefac4e2f91dc4c482a997b7000000210f2e1a664798c44379dfb9d6adbe90dfe2989f430f5eb265566666") getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0)=""/42, &(0x7f0000000200)=0x2a) 03:39:36 executing program 1: keyctl$set_reqkey_keyring(0x15, 0x2) accept4$inet6(0xffffffffffffff9c, &(0x7f0000003600)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000003640)=0x1c, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000003680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9ce41ff0f1837370f0fdaaac4c19086d9f28fc9410feefa4e2179fbe5e5c4c1e16a9901725e45c4010d64ac1e5d31a3b706e2989f3b690b5241") signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000cd8ff4)) listen(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000340)) 03:39:36 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f00000003c0)={0x1, &(0x7f0000000000)=[{0x10000040000006, 0x0, 0x0, 0x58fe8}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:39:36 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f00000003c0)={0x1, &(0x7f0000000000)=[{0x10000040000006, 0x0, 0x0, 0x58fe8}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:39:36 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f00000003c0)={0x1, &(0x7f0000000000)=[{0x10000040000006, 0x0, 0x0, 0x58fe8}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:39:37 executing program 5: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000300)={0x0, @rand_addr, @remote}, &(0x7f0000000340)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@dev, @in6}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000540)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000740)=@xdp, 0x80, &(0x7f0000000a80), 0x0, &(0x7f0000000ac0)=""/195, 0xc3}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000180), 0xc, &(0x7f0000000e80)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) 03:39:37 executing program 4: getrlimit(0x0, &(0x7f0000000280)) clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000180), 0x0) epoll_create1(0x0) close(0xffffffffffffffff) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000c85000)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0610fef69dce9d92a5c6cf14132f1413237160f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5dc4a1b9e85aff7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000010c0)=ANY=[], &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000023c0)=@assoc_value, &(0x7f0000002400)=0x8) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000400), &(0x7f0000004b40)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={@ipv4={[], [], @rand_addr}}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)={@ipv4={[], [], @multicast2}}, &(0x7f0000000640)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'veth0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00)={@broadcast, @remote}, &(0x7f0000000a40)=0xc) 03:39:37 executing program 0: getrusage(0x0, &(0x7f0000000a80)) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_getres(0x0, &(0x7f0000000000)) semget(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000140)={'veth1_to_bond\x00'}) eventfd(0x0) geteuid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000300)) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f0000000340)={{0x77359400}}, 0x0) setfsuid(0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000280)=ANY=[]) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000a00)=0xe8) syz_open_procfs(0x0, &(0x7f0000000240)='net/netfilter\x00') write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) syz_execute_func(&(0x7f0000000380)="42805da0756d6def69dc0f01eeaff241a641ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefac4e2f91dc4c482a997b7000000210f2e1a664798c44379dfb9d6adbe90dfe2989f430f5eb265566666") getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0)=""/42, &(0x7f0000000200)=0x2a) 03:39:37 executing program 2: prctl$intptr(0x400000000004, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000440)=""/177) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000080)) shmctl$SHM_STAT(0x0, 0xd, &(0x7f00000005c0)=""/204) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000000c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:39:37 executing program 3: syslog(0xa, &(0x7f0000000a40)=""/147, 0x15) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) fcntl$getflags(0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f0000000200), &(0x7f0000000480), &(0x7f0000000280)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000b00), 0x0, 0x0, 0xfffffffffffffffd) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) clock_gettime(0x0, &(0x7f0000000380)) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000016c0)=""/231, 0xe7}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') clock_gettime(0x0, &(0x7f0000001b00)) recvmmsg(0xffffffffffffffff, &(0x7f0000003f40), 0x0, 0x0, &(0x7f0000002c40)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004100)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000004140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004180)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'vcan0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008bc0)={@loopback}, &(0x7f0000008c00)=0xc) recvmsg(0xffffffffffffffff, &(0x7f0000008ec0)={&(0x7f0000008c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000008e80)}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000009200)={'rose0\x00', @ifru_addrs=@can}) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a380)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a4c0)={'ip6gre0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f000000a700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a740)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f000000a940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000a980)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000aa80)={{{@in6=@local, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f000000ab80)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000b0c0)={&(0x7f0000000b40), 0xc, &(0x7f000000b080)={&(0x7f000000abc0)={0x14}, 0x14}}, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000980)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) accept$packet(0xffffffffffffffff, &(0x7f0000001b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001b80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f0000000440), &(0x7f0000000540)='system)\x00', 0xfffffffffffffffb) add_key(&(0x7f0000000840)='dns_resolver\x00', &(0x7f0000000880), 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f00000007c0)='asymmetric\x00', &(0x7f0000000800), 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000180)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@broadcast}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) exit(0x0) 03:39:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001480)={[{@swalloc='swalloc'}, {@filestreams='filestreams'}]}) [ 1184.684670] XFS (loop1): Invalid superblock magic number 03:39:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001480)={[{@swalloc='swalloc'}, {@filestreams='filestreams'}]}) [ 1185.074070] XFS (loop1): Invalid superblock magic number 03:39:37 executing program 5: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x8c4b815a5465c2b2, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f0000000040)) 03:39:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001480)={[{@swalloc='swalloc'}, {@filestreams='filestreams'}]}) 03:39:38 executing program 4: getrlimit(0x0, &(0x7f0000000280)) clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000180), 0x0) epoll_create1(0x0) close(0xffffffffffffffff) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000c85000)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0610fef69dce9d92a5c6cf14132f1413237160f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5dc4a1b9e85aff7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000010c0)=ANY=[], &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000023c0)=@assoc_value, &(0x7f0000002400)=0x8) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000400), &(0x7f0000004b40)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={@ipv4={[], [], @rand_addr}}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)={@ipv4={[], [], @multicast2}}, &(0x7f0000000640)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'veth0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00)={@broadcast, @remote}, &(0x7f0000000a40)=0xc) 03:39:38 executing program 3: syslog(0xa, &(0x7f0000000a40)=""/147, 0x15) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) fcntl$getflags(0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f0000000200), &(0x7f0000000480), &(0x7f0000000280)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000b00), 0x0, 0x0, 0xfffffffffffffffd) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) clock_gettime(0x0, &(0x7f0000000380)) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000016c0)=""/231, 0xe7}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') clock_gettime(0x0, &(0x7f0000001b00)) recvmmsg(0xffffffffffffffff, &(0x7f0000003f40), 0x0, 0x0, &(0x7f0000002c40)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004100)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000004140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004180)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'vcan0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008bc0)={@loopback}, &(0x7f0000008c00)=0xc) recvmsg(0xffffffffffffffff, &(0x7f0000008ec0)={&(0x7f0000008c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000008e80)}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000009200)={'rose0\x00', @ifru_addrs=@can}) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a380)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a4c0)={'ip6gre0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f000000a700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a740)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f000000a940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000a980)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000aa80)={{{@in6=@local, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f000000ab80)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000b0c0)={&(0x7f0000000b40), 0xc, &(0x7f000000b080)={&(0x7f000000abc0)={0x14}, 0x14}}, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000980)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) accept$packet(0xffffffffffffffff, &(0x7f0000001b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001b80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f0000000440), &(0x7f0000000540)='system)\x00', 0xfffffffffffffffb) add_key(&(0x7f0000000840)='dns_resolver\x00', &(0x7f0000000880), 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f00000007c0)='asymmetric\x00', &(0x7f0000000800), 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000180)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@broadcast}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) exit(0x0) 03:39:38 executing program 2: prctl$intptr(0x400000000004, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000440)=""/177) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000080)) shmctl$SHM_STAT(0x0, 0xd, &(0x7f00000005c0)=""/204) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000000c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:39:38 executing program 5: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x8c4b815a5465c2b2, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f0000000040)) 03:39:38 executing program 5: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x8c4b815a5465c2b2, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f0000000040)) 03:39:38 executing program 0: getrusage(0x0, &(0x7f0000000a80)) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_getres(0x0, &(0x7f0000000000)) semget(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000140)={'veth1_to_bond\x00'}) eventfd(0x0) geteuid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000300)) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f0000000340)={{0x77359400}}, 0x0) setfsuid(0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000280)=ANY=[]) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000a00)=0xe8) syz_open_procfs(0x0, &(0x7f0000000240)='net/netfilter\x00') write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) syz_execute_func(&(0x7f0000000380)="42805da0756d6def69dc0f01eeaff241a641ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefac4e2f91dc4c482a997b7000000210f2e1a664798c44379dfb9d6adbe90dfe2989f430f5eb265566666") getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0)=""/42, &(0x7f0000000200)=0x2a) [ 1185.442382] XFS (loop1): Invalid superblock magic number 03:39:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001480)={[{@swalloc='swalloc'}, {@filestreams='filestreams'}]}) 03:39:38 executing program 5: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x8c4b815a5465c2b2, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f0000000040)) 03:39:38 executing program 5: getitimer(0x0, &(0x7f0000000240)) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28}, 0x28) uname(&(0x7f0000000b00)=""/200) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@local, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) request_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000300), &(0x7f0000000340)='vmnet1-\x00', 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000380), 0xc, &(0x7f0000000980)={&(0x7f0000000580)={0x14}, 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000440)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)) [ 1185.781922] XFS (loop1): Invalid superblock magic number 03:39:38 executing program 1: syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1000000000000, 0x202002) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000240)={0x0, &(0x7f0000000440)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team_slave_1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}}}, &(0x7f0000000400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000740)={@remote}, &(0x7f0000000780)=0x14) 03:39:38 executing program 4: getrlimit(0x0, &(0x7f0000000280)) clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000180), 0x0) epoll_create1(0x0) close(0xffffffffffffffff) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000c85000)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0610fef69dce9d92a5c6cf14132f1413237160f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5dc4a1b9e85aff7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000010c0)=ANY=[], &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000023c0)=@assoc_value, &(0x7f0000002400)=0x8) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000400), &(0x7f0000004b40)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={@ipv4={[], [], @rand_addr}}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)={@ipv4={[], [], @multicast2}}, &(0x7f0000000640)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'veth0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00)={@broadcast, @remote}, &(0x7f0000000a40)=0xc) 03:39:39 executing program 3: syslog(0xa, &(0x7f0000000a40)=""/147, 0x15) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) fcntl$getflags(0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f0000000200), &(0x7f0000000480), &(0x7f0000000280)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000b00), 0x0, 0x0, 0xfffffffffffffffd) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) clock_gettime(0x0, &(0x7f0000000380)) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000016c0)=""/231, 0xe7}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') clock_gettime(0x0, &(0x7f0000001b00)) recvmmsg(0xffffffffffffffff, &(0x7f0000003f40), 0x0, 0x0, &(0x7f0000002c40)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004100)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000004140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004180)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'vcan0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008bc0)={@loopback}, &(0x7f0000008c00)=0xc) recvmsg(0xffffffffffffffff, &(0x7f0000008ec0)={&(0x7f0000008c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000008e80)}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000009200)={'rose0\x00', @ifru_addrs=@can}) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a380)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a4c0)={'ip6gre0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f000000a700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a740)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f000000a940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000a980)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000aa80)={{{@in6=@local, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f000000ab80)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000b0c0)={&(0x7f0000000b40), 0xc, &(0x7f000000b080)={&(0x7f000000abc0)={0x14}, 0x14}}, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000980)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) accept$packet(0xffffffffffffffff, &(0x7f0000001b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001b80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f0000000440), &(0x7f0000000540)='system)\x00', 0xfffffffffffffffb) add_key(&(0x7f0000000840)='dns_resolver\x00', &(0x7f0000000880), 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f00000007c0)='asymmetric\x00', &(0x7f0000000800), 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000180)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@broadcast}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) exit(0x0) 03:39:39 executing program 2: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0xfffffffffffffffe) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f00000002c0)) timerfd_create(0x0, 0x0) set_tid_address(&(0x7f00000001c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) setpriority(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000380)) openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) [ 1186.494248] audit: type=1326 audit(2000000000.100:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8545 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:20 executing program 0: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7}, 0x0) 03:33:20 executing program 0: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7}, 0x0) 03:33:20 executing program 5: getitimer(0x0, &(0x7f0000000240)) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28}, 0x28) uname(&(0x7f0000000b00)=""/200) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@local, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) request_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000300), &(0x7f0000000340)='vmnet1-\x00', 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000380), 0xc, &(0x7f0000000980)={&(0x7f0000000580)={0x14}, 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000440)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)) 03:33:20 executing program 0: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7}, 0x0) 03:33:20 executing program 1: syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1000000000000, 0x202002) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000240)={0x0, &(0x7f0000000440)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team_slave_1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}}}, &(0x7f0000000400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000740)={@remote}, &(0x7f0000000780)=0x14) 03:33:20 executing program 0: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7}, 0x0) 03:33:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x3}]}}}]}, 0x3c}}, 0x0) 03:33:20 executing program 3: syslog(0xa, &(0x7f0000000a40)=""/147, 0x15) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) fcntl$getflags(0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f0000000200), &(0x7f0000000480), &(0x7f0000000280)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000b00), 0x0, 0x0, 0xfffffffffffffffd) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) clock_gettime(0x0, &(0x7f0000000380)) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000016c0)=""/231, 0xe7}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') clock_gettime(0x0, &(0x7f0000001b00)) recvmmsg(0xffffffffffffffff, &(0x7f0000003f40), 0x0, 0x0, &(0x7f0000002c40)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004100)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000004140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004180)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'vcan0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008bc0)={@loopback}, &(0x7f0000008c00)=0xc) recvmsg(0xffffffffffffffff, &(0x7f0000008ec0)={&(0x7f0000008c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000008e80)}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000009200)={'rose0\x00', @ifru_addrs=@can}) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a380)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a4c0)={'ip6gre0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f000000a700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a740)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f000000a940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000a980)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000aa80)={{{@in6=@local, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f000000ab80)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000b0c0)={&(0x7f0000000b40), 0xc, &(0x7f000000b080)={&(0x7f000000abc0)={0x14}, 0x14}}, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000980)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) accept$packet(0xffffffffffffffff, &(0x7f0000001b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001b80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f0000000440), &(0x7f0000000540)='system)\x00', 0xfffffffffffffffb) add_key(&(0x7f0000000840)='dns_resolver\x00', &(0x7f0000000880), 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f00000007c0)='asymmetric\x00', &(0x7f0000000800), 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000180)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@broadcast}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) exit(0x0) 03:33:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_bt(r0, 0x5411, &(0x7f0000000140)) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 03:33:20 executing program 4: keyctl$set_reqkey_keyring(0x12, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) gettid() 03:33:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x3}]}}}]}, 0x3c}}, 0x0) [ 1187.293355] audit: type=1326 audit(2000000000.110:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8545 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:20 executing program 2: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0xfffffffffffffffe) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f00000002c0)) timerfd_create(0x0, 0x0) set_tid_address(&(0x7f00000001c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) setpriority(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000380)) openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) 03:33:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_bt(r0, 0x5411, &(0x7f0000000140)) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 03:33:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x3}]}}}]}, 0x3c}}, 0x0) [ 1187.570403] audit: type=1326 audit(2000000000.120:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8589 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:20 executing program 5: getitimer(0x0, &(0x7f0000000240)) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28}, 0x28) uname(&(0x7f0000000b00)=""/200) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@local, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) request_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000300), &(0x7f0000000340)='vmnet1-\x00', 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000380), 0xc, &(0x7f0000000980)={&(0x7f0000000580)={0x14}, 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000440)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)) 03:33:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_bt(r0, 0x5411, &(0x7f0000000140)) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 03:33:20 executing program 1: syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1000000000000, 0x202002) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000240)={0x0, &(0x7f0000000440)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team_slave_1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}}}, &(0x7f0000000400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000740)={@remote}, &(0x7f0000000780)=0x14) 03:33:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_bt(r0, 0x5411, &(0x7f0000000140)) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 03:33:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x3}]}}}]}, 0x3c}}, 0x0) 03:33:20 executing program 3: syslog(0x0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000780)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in=@broadcast}}, {{@in=@broadcast}}}, 0xe8) timer_create(0x0, &(0x7f00000001c0), &(0x7f0000000400)) memfd_create(&(0x7f00000006c0)='!em1mime_typeloposix_acl_access/em0\x00', 0x0) timer_getoverrun(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="f8805da01d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df9f3f") 03:33:20 executing program 0: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0x28, &(0x7f00000000c0)}, 0x10) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) getrusage(0x0, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) sched_setattr(0x0, &(0x7f00000003c0), 0x0) geteuid() getresgid(&(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) fchown(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000640)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000140)="42805da0120fef69dc0f01ee67f04683090019fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae519f075450f2e1a44dbe264642e3e0f1be80703") 03:33:20 executing program 4: keyctl$set_reqkey_keyring(0x12, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) gettid() 03:33:20 executing program 2: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0xfffffffffffffffe) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f00000002c0)) timerfd_create(0x0, 0x0) set_tid_address(&(0x7f00000001c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) setpriority(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000380)) openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) [ 1188.469257] audit: type=1326 audit(2000000000.100:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8630 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:20 executing program 5: getitimer(0x0, &(0x7f0000000240)) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28}, 0x28) uname(&(0x7f0000000b00)=""/200) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@local, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) request_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000300), &(0x7f0000000340)='vmnet1-\x00', 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000380), 0xc, &(0x7f0000000980)={&(0x7f0000000580)={0x14}, 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000440)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)) 03:33:20 executing program 1: syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1000000000000, 0x202002) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000240)={0x0, &(0x7f0000000440)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team_slave_1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}}}, &(0x7f0000000400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000740)={@remote}, &(0x7f0000000780)=0x14) 03:33:20 executing program 3: syslog(0x0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000780)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in=@broadcast}}, {{@in=@broadcast}}}, 0xe8) timer_create(0x0, &(0x7f00000001c0), &(0x7f0000000400)) memfd_create(&(0x7f00000006c0)='!em1mime_typeloposix_acl_access/em0\x00', 0x0) timer_getoverrun(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="f8805da01d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df9f3f") 03:33:20 executing program 0: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0x28, &(0x7f00000000c0)}, 0x10) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) getrusage(0x0, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) sched_setattr(0x0, &(0x7f00000003c0), 0x0) geteuid() getresgid(&(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) fchown(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000640)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000140)="42805da0120fef69dc0f01ee67f04683090019fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae519f075450f2e1a44dbe264642e3e0f1be80703") 03:33:20 executing program 4: keyctl$set_reqkey_keyring(0x12, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) gettid() 03:33:20 executing program 2: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0xfffffffffffffffe) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f00000002c0)) timerfd_create(0x0, 0x0) set_tid_address(&(0x7f00000001c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) setpriority(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000380)) openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) [ 1189.396395] audit: type=1326 audit(2000000000.110:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8656 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:20 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x802}) 03:33:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000), 0xc, &(0x7f00006bcff0)={&(0x7f000013e000)=@ipv6_newroute={0x2c, 0x18, 0x301, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x5}, @RTA_ENCAP={0x8, 0x16, @nested={0x4, 0x4001}}]}, 0x2c}}, 0x0) 03:33:20 executing program 3: syslog(0x0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000780)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in=@broadcast}}, {{@in=@broadcast}}}, 0xe8) timer_create(0x0, &(0x7f00000001c0), &(0x7f0000000400)) memfd_create(&(0x7f00000006c0)='!em1mime_typeloposix_acl_access/em0\x00', 0x0) timer_getoverrun(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="f8805da01d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df9f3f") [ 1189.736930] netlink: 'syz-executor1': attribute type 21 has an invalid length. 03:33:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000), 0xc, &(0x7f00006bcff0)={&(0x7f000013e000)=@ipv6_newroute={0x2c, 0x18, 0x301, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x5}, @RTA_ENCAP={0x8, 0x16, @nested={0x4, 0x4001}}]}, 0x2c}}, 0x0) [ 1189.878509] device nr0 entered promiscuous mode [ 1189.902664] netlink: 'syz-executor1': attribute type 21 has an invalid length. 03:33:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000), 0xc, &(0x7f00006bcff0)={&(0x7f000013e000)=@ipv6_newroute={0x2c, 0x18, 0x301, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x5}, @RTA_ENCAP={0x8, 0x16, @nested={0x4, 0x4001}}]}, 0x2c}}, 0x0) 03:33:20 executing program 4: keyctl$set_reqkey_keyring(0x12, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) gettid() 03:33:20 executing program 0: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0x28, &(0x7f00000000c0)}, 0x10) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) getrusage(0x0, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) sched_setattr(0x0, &(0x7f00000003c0), 0x0) geteuid() getresgid(&(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) fchown(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000640)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000140)="42805da0120fef69dc0f01ee67f04683090019fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae519f075450f2e1a44dbe264642e3e0f1be80703") 03:33:20 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x40840, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000400)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000440)=0xfffffffffffffcb1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 1190.513143] netlink: 'syz-executor1': attribute type 21 has an invalid length. 03:33:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000), 0xc, &(0x7f00006bcff0)={&(0x7f000013e000)=@ipv6_newroute={0x2c, 0x18, 0x301, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x5}, @RTA_ENCAP={0x8, 0x16, @nested={0x4, 0x4001}}]}, 0x2c}}, 0x0) 03:33:21 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x802}) [ 1190.628679] netlink: 'syz-executor1': attribute type 21 has an invalid length. 03:33:21 executing program 3: syslog(0x0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000780)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in=@broadcast}}, {{@in=@broadcast}}}, 0xe8) timer_create(0x0, &(0x7f00000001c0), &(0x7f0000000400)) memfd_create(&(0x7f00000006c0)='!em1mime_typeloposix_acl_access/em0\x00', 0x0) timer_getoverrun(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="f8805da01d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df9f3f") 03:33:21 executing program 1: unshare(0x0) munlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a00)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000019c0)='eth1.Z-\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001a40), &(0x7f0000001a80), &(0x7f0000001ac0)) gettid() fstat(0xffffffffffffffff, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b80), &(0x7f0000001bc0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001c00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001c40)={{{@in6, @in6=@remote}}, {{@in6=@remote}}}, &(0x7f0000001d40)=0xe8) getgid() getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000002080), &(0x7f00000020c0)=0x4) getpgid(0xffffffffffffffff) lstat(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)) stat(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002000), 0x0, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)='lo\x00', 0xffffffffffffffff) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f00000001c0)=""/53) keyctl$setperm(0x5, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004dc0)={{{@in6=@local, @in6}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000004ec0)=0xe8) [ 1190.858757] device nr0 entered promiscuous mode 03:33:21 executing program 4: rmdir(&(0x7f0000000200)='./file0\x00') getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)) getpgid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}}}, 0x48) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)) semget(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) epoll_create(0x0) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000600)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000240)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:21 executing program 0: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0x28, &(0x7f00000000c0)}, 0x10) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) getrusage(0x0, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) sched_setattr(0x0, &(0x7f00000003c0), 0x0) geteuid() getresgid(&(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) fchown(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000640)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000140)="42805da0120fef69dc0f01ee67f04683090019fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae519f075450f2e1a44dbe264642e3e0f1be80703") 03:33:21 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x40840, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000400)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000440)=0xfffffffffffffcb1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:22 executing program 3: clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000180), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000a00)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000004ac0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) getresuid(&(0x7f0000004b40), &(0x7f0000004b80), &(0x7f0000004bc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x11a, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000200), 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) 03:33:22 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x802}) 03:33:22 executing program 1: unshare(0x0) munlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a00)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000019c0)='eth1.Z-\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001a40), &(0x7f0000001a80), &(0x7f0000001ac0)) gettid() fstat(0xffffffffffffffff, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b80), &(0x7f0000001bc0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001c00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001c40)={{{@in6, @in6=@remote}}, {{@in6=@remote}}}, &(0x7f0000001d40)=0xe8) getgid() getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000002080), &(0x7f00000020c0)=0x4) getpgid(0xffffffffffffffff) lstat(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)) stat(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002000), 0x0, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)='lo\x00', 0xffffffffffffffff) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f00000001c0)=""/53) keyctl$setperm(0x5, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004dc0)={{{@in6=@local, @in6}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000004ec0)=0xe8) [ 1191.893212] device nr0 entered promiscuous mode 03:33:22 executing program 4: rmdir(&(0x7f0000000200)='./file0\x00') getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)) getpgid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}}}, 0x48) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)) semget(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) epoll_create(0x0) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000600)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000240)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:22 executing program 0: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000540)={'team0\x00'}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:22 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x40840, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000400)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000440)=0xfffffffffffffcb1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:23 executing program 3: clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000180), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000a00)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000004ac0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) getresuid(&(0x7f0000004b40), &(0x7f0000004b80), &(0x7f0000004bc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x11a, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000200), 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) 03:33:23 executing program 1: unshare(0x0) munlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a00)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000019c0)='eth1.Z-\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001a40), &(0x7f0000001a80), &(0x7f0000001ac0)) gettid() fstat(0xffffffffffffffff, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b80), &(0x7f0000001bc0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001c00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001c40)={{{@in6, @in6=@remote}}, {{@in6=@remote}}}, &(0x7f0000001d40)=0xe8) getgid() getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000002080), &(0x7f00000020c0)=0x4) getpgid(0xffffffffffffffff) lstat(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)) stat(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002000), 0x0, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)='lo\x00', 0xffffffffffffffff) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f00000001c0)=""/53) keyctl$setperm(0x5, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004dc0)={{{@in6=@local, @in6}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000004ec0)=0xe8) 03:33:23 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x802}) 03:33:23 executing program 4: rmdir(&(0x7f0000000200)='./file0\x00') getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)) getpgid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}}}, 0x48) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)) semget(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) epoll_create(0x0) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000600)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000240)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:23 executing program 0: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000540)={'team0\x00'}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") [ 1192.970136] device nr0 entered promiscuous mode 03:33:23 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x40840, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000400)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000440)=0xfffffffffffffcb1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:24 executing program 3: clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000180), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000a00)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000004ac0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) getresuid(&(0x7f0000004b40), &(0x7f0000004b80), &(0x7f0000004bc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x11a, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000200), 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) 03:33:24 executing program 1: unshare(0x0) munlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a00)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000019c0)='eth1.Z-\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001a40), &(0x7f0000001a80), &(0x7f0000001ac0)) gettid() fstat(0xffffffffffffffff, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b80), &(0x7f0000001bc0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001c00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001c40)={{{@in6, @in6=@remote}}, {{@in6=@remote}}}, &(0x7f0000001d40)=0xe8) getgid() getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000002080), &(0x7f00000020c0)=0x4) getpgid(0xffffffffffffffff) lstat(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)) stat(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002000), 0x0, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)='lo\x00', 0xffffffffffffffff) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f00000001c0)=""/53) keyctl$setperm(0x5, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004dc0)={{{@in6=@local, @in6}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000004ec0)=0xe8) 03:33:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000440)='net/wireless\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000600)='team_slave_0\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f00000005c0)="212c656d3173656c664047504c73797374656dfe00"}, 0x30) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000001700), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") 03:33:24 executing program 4: rmdir(&(0x7f0000000200)='./file0\x00') getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)) getpgid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}}}, 0x48) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)) semget(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) epoll_create(0x0) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000600)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000240)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:24 executing program 0: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000540)={'team0\x00'}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/122, 0x7a}, 0x0) 03:33:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/122, 0x7a}, 0x0) 03:33:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/122, 0x7a}, 0x0) 03:33:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/122, 0x7a}, 0x0) 03:33:25 executing program 3: clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000180), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000a00)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000004ac0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) getresuid(&(0x7f0000004b40), &(0x7f0000004b80), &(0x7f0000004bc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x11a, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000200), 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) 03:33:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/122, 0x7a}, 0x0) 03:33:25 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000200)=@in={0x2, 0x0, @rand_addr=0x1000c0586300}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000500)="ec", 0x1}], 0x1}, 0x0) 03:33:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/122, 0x7a}, 0x0) 03:33:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/122, 0x7a}, 0x0) 03:33:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000440)='net/wireless\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000600)='team_slave_0\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f00000005c0)="212c656d3173656c664047504c73797374656dfe00"}, 0x30) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000001700), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") 03:33:25 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000200)=@in={0x2, 0x0, @rand_addr=0x1000c0586300}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000500)="ec", 0x1}], 0x1}, 0x0) 03:33:25 executing program 0: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000540)={'team0\x00'}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) clone(0x210007fd, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$sock_SIOCINQ(r0, 0x408c5333, &(0x7f0000000040)) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f00000001c0)=ANY=[]) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x20000000, &(0x7f0000000000), 0x10) 03:33:25 executing program 2: perf_event_open(&(0x7f0000000a40)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="24000000190001f0008000361731ed640adfa90100b70006000000cc08000f00fed70000", 0x24) 03:33:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) clone(0x210007fd, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$sock_SIOCINQ(r0, 0x408c5333, &(0x7f0000000040)) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f00000001c0)=ANY=[]) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x20000000, &(0x7f0000000000), 0x10) 03:33:25 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000200)=@in={0x2, 0x0, @rand_addr=0x1000c0586300}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000500)="ec", 0x1}], 0x1}, 0x0) 03:33:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) clone(0x210007fd, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$sock_SIOCINQ(r0, 0x408c5333, &(0x7f0000000040)) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f00000001c0)=ANY=[]) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x20000000, &(0x7f0000000000), 0x10) 03:33:26 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000200)=@in={0x2, 0x0, @rand_addr=0x1000c0586300}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000500)="ec", 0x1}], 0x1}, 0x0) 03:33:26 executing program 2: perf_event_open(&(0x7f0000000a40)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="24000000190001f0008000361731ed640adfa90100b70006000000cc08000f00fed70000", 0x24) 03:33:26 executing program 3: timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001340)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000001380)={{0x2, 0x0, @multicast1}, {}, 0x0, {0x2, 0x0, @remote}, 'erspan0\x00'}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) fchown(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000480)=@loop={'/dev/loop'}, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)) futimesat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={{0x77359400}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) userfaultfd(0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000080)) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000540)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) clone(0x210007fd, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$sock_SIOCINQ(r0, 0x408c5333, &(0x7f0000000040)) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f00000001c0)=ANY=[]) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x20000000, &(0x7f0000000000), 0x10) 03:33:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000440)='net/wireless\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000600)='team_slave_0\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f00000005c0)="212c656d3173656c664047504c73797374656dfe00"}, 0x30) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000001700), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") 03:33:26 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffe) pipe(&(0x7f00000001c0)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000280)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f00000007c0), 0x4) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000780)={0x18}, 0x18) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) getpgid(0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1{cpuset[vmnet1eth1', 0x0) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000700)) semtimedop(0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)) 03:33:26 executing program 4: r0 = syz_open_dev$evdev(&(0x7f000004a000)='/dev/input/event#\x00', 0x0, 0x20900) readv(r0, &(0x7f0000001300)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) 03:33:26 executing program 2: perf_event_open(&(0x7f0000000a40)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="24000000190001f0008000361731ed640adfa90100b70006000000cc08000f00fed70000", 0x24) 03:33:26 executing program 0: rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='./file0\x00') clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000001c0)) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:26 executing program 2: perf_event_open(&(0x7f0000000a40)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="24000000190001f0008000361731ed640adfa90100b70006000000cc08000f00fed70000", 0x24) 03:33:26 executing program 4: r0 = syz_open_dev$evdev(&(0x7f000004a000)='/dev/input/event#\x00', 0x0, 0x20900) readv(r0, &(0x7f0000001300)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) 03:33:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000380)}], 0x8000, &(0x7f0000000480)) 03:33:26 executing program 4: r0 = syz_open_dev$evdev(&(0x7f000004a000)='/dev/input/event#\x00', 0x0, 0x20900) readv(r0, &(0x7f0000001300)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) 03:33:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000380)}], 0x8000, &(0x7f0000000480)) 03:33:27 executing program 3: timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001340)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000001380)={{0x2, 0x0, @multicast1}, {}, 0x0, {0x2, 0x0, @remote}, 'erspan0\x00'}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) fchown(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000480)=@loop={'/dev/loop'}, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)) futimesat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={{0x77359400}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) userfaultfd(0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000080)) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000540)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:27 executing program 4: r0 = syz_open_dev$evdev(&(0x7f000004a000)='/dev/input/event#\x00', 0x0, 0x20900) readv(r0, &(0x7f0000001300)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) 03:33:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000440)='net/wireless\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000600)='team_slave_0\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f00000005c0)="212c656d3173656c664047504c73797374656dfe00"}, 0x30) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000001700), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") 03:33:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000380)}], 0x8000, &(0x7f0000000480)) 03:33:27 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffe) pipe(&(0x7f00000001c0)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000280)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f00000007c0), 0x4) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000780)={0x18}, 0x18) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) getpgid(0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1{cpuset[vmnet1eth1', 0x0) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000700)) semtimedop(0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)) 03:33:27 executing program 0: rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='./file0\x00') clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000001c0)) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000380)}], 0x8000, &(0x7f0000000480)) 03:33:27 executing program 3: timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001340)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000001380)={{0x2, 0x0, @multicast1}, {}, 0x0, {0x2, 0x0, @remote}, 'erspan0\x00'}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) fchown(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000480)=@loop={'/dev/loop'}, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)) futimesat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={{0x77359400}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) userfaultfd(0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000080)) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000540)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:28 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffe) pipe(&(0x7f00000001c0)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000280)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f00000007c0), 0x4) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000780)={0x18}, 0x18) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) getpgid(0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1{cpuset[vmnet1eth1', 0x0) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000700)) semtimedop(0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)) 03:33:28 executing program 0: rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='./file0\x00') clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000001c0)) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:28 executing program 3: timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001340)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000001380)={{0x2, 0x0, @multicast1}, {}, 0x0, {0x2, 0x0, @remote}, 'erspan0\x00'}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) fchown(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000480)=@loop={'/dev/loop'}, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)) futimesat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={{0x77359400}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) userfaultfd(0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000080)) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000540)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:29 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffe) pipe(&(0x7f00000001c0)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000280)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f00000007c0), 0x4) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000780)={0x18}, 0x18) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) getpgid(0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1{cpuset[vmnet1eth1', 0x0) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000700)) semtimedop(0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)) 03:33:29 executing program 0: rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='./file0\x00') clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000001c0)) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000280a26dde896748b050d600611840"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0xbb, &(0x7f0000000300)=""/187}, 0x18) 03:33:32 executing program 5: syz_open_dev$loop(&(0x7f0000000980)='/dev/loop#\x00', 0x0, 0x101000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000001180)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgget(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)) getresgid(&(0x7f0000000880), &(0x7f0000000940), &(0x7f0000000680)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in=@rand_addr, @in=@remote}}, {{}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000500)=0xc) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000006c0)) accept$alg(0xffffffffffffffff, 0x0, 0x0) eventfd(0x0) inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) memfd_create(&(0x7f0000000780)='\x00', 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vhci\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000740)='cgroup.type\x00', 0x2, 0x0) inotify_init() openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000800)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000007c0)) syz_execute_func(&(0x7f00000008c0)="26656436660f2a3e8055a07a7a69ef69dc00d990c841ff0f185c38d4c4022d9b65fec19086d9f28fc9e5e543ddce2b74742e1a1ac4415d71d40031a3b786e2987f") ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000040)) 03:33:32 executing program 2: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) syslog(0x0, 0x0, 0xffffffffffffff1a) 03:33:32 executing program 3: keyctl$set_reqkey_keyring(0xb, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in6}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000004c0)) getgroups(0x8, &(0x7f0000000280)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000080)='/dev/ppp\x00') futex(&(0x7f0000000380), 0x5, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f00000005c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000600)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"d6bdd88ed4bc50ef7d587bfd51fdb16a"}}, @ib={0x1b, 0x0, 0x0, {"0fa48067f9b0cd1c4dfb7995aa1f8f60"}}}}, 0x118) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000400)=@add_del={0x2, &(0x7f0000000300)='ifb0\x00'}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:32 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x9000000}) 03:33:32 executing program 1: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffb) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000840)) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) request_key(&(0x7f0000000800)='blacklist\x00', &(0x7f0000000880), &(0x7f0000000740)='/dev/ppp\x00', 0x0) pivot_root(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000a00)=""/243) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000009c0), 0x8) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 03:33:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000280a26dde896748b050d600611840"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0xbb, &(0x7f0000000300)=""/187}, 0x18) 03:33:32 executing program 2: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) syslog(0x0, 0x0, 0xffffffffffffff1a) 03:33:32 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x9000000}) 03:33:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000280a26dde896748b050d600611840"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0xbb, &(0x7f0000000300)=""/187}, 0x18) 03:33:32 executing program 2: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) syslog(0x0, 0x0, 0xffffffffffffff1a) 03:33:32 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x0) gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresuid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in=@remote, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000b40)=0xe8) getegid() getresuid(&(0x7f00000026c0), &(0x7f0000002700), &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002780)) stat(&(0x7f0000002b00)='./file0\x00', &(0x7f0000002b40)) stat(&(0x7f0000002bc0)='./file0\x00', &(0x7f0000002c00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002c80)={{{@in=@dev, @in=@local}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002d80)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000004440)) getgid() getresuid(&(0x7f00000044c0), &(0x7f0000004500), &(0x7f0000004540)) getresgid(&(0x7f0000004580), &(0x7f00000045c0), &(0x7f0000004600)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004640)={{{@in=@multicast1, @in6=@ipv4={[], [], @loopback}}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000004740)=0xe8) lstat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004840), &(0x7f0000004880)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000048c0), &(0x7f0000004900)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000004940)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) lstat(&(0x7f0000005d40)='./file0\x00', &(0x7f0000005d80)) lstat(&(0x7f0000005e00)='./file0\x00', &(0x7f0000005e40)) fstat(0xffffffffffffffff, &(0x7f0000005ec0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005f40)={{{@in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000006040)=0xe8) getgroups(0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@remote}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f00000061c0)=0xe8) stat(&(0x7f0000006200)='./file0\x00', &(0x7f0000006240)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000063c0), 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:32 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x9000000}) 03:33:33 executing program 5: syz_open_dev$loop(&(0x7f0000000980)='/dev/loop#\x00', 0x0, 0x101000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000001180)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgget(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)) getresgid(&(0x7f0000000880), &(0x7f0000000940), &(0x7f0000000680)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in=@rand_addr, @in=@remote}}, {{}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000500)=0xc) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000006c0)) accept$alg(0xffffffffffffffff, 0x0, 0x0) eventfd(0x0) inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) memfd_create(&(0x7f0000000780)='\x00', 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vhci\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000740)='cgroup.type\x00', 0x2, 0x0) inotify_init() openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000800)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000007c0)) syz_execute_func(&(0x7f00000008c0)="26656436660f2a3e8055a07a7a69ef69dc00d990c841ff0f185c38d4c4022d9b65fec19086d9f28fc9e5e543ddce2b74742e1a1ac4415d71d40031a3b786e2987f") ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000040)) 03:33:33 executing program 2: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) syslog(0x0, 0x0, 0xffffffffffffff1a) 03:33:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000280a26dde896748b050d600611840"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0xbb, &(0x7f0000000300)=""/187}, 0x18) 03:33:33 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x9000000}) 03:33:33 executing program 1: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffb) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000840)) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) request_key(&(0x7f0000000800)='blacklist\x00', &(0x7f0000000880), &(0x7f0000000740)='/dev/ppp\x00', 0x0) pivot_root(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000a00)=""/243) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000009c0), 0x8) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 03:33:33 executing program 0: keyctl$set_reqkey_keyring(0x1d, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) delete_module(&(0x7f0000000400)="292c65762d766d6e6574382100b20c754beb04c44ff2d9d54b946d37870ab4967063d903f3438084a8e25e0b45b495748a928c5898cb880454506aa6ca7e8eec076a199ed290017dd435defc3c9b562580d922ae06192d5ca5b15b0018ee3ef62560d7358afd4be83d8e181f3a44121774a1e026a0f3f270fa5ee032a956a00ff00c12c4", 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000280)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getuid() getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:33 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x7fffffff, 0x80) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000017c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002cc0)={{{@in6=@remote, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000002dc0)=0xe8) lstat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) getpid() fstat(r0, &(0x7f0000002f00)) getgid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002f80)) stat(&(0x7f0000002fc0)='./file0\x00', &(0x7f0000003000)) getgroups(0x3, &(0x7f0000003080)=[0x0, 0xee01, 0xee01]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000004cc0)) geteuid() getgroups(0x6, &(0x7f0000004d00)=[0xffffffffffffffff, 0xee01, 0xee00, 0x0, 0xee00, 0xee01]) fcntl$getown(r0, 0x9) getuid() getegid() getegid() gettid() stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) stat(&(0x7f0000005200)='./file0\x00', &(0x7f0000005240)) sendmmsg$unix(r1, &(0x7f00000086c0)=[{&(0x7f0000005340)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000008640)=[{&(0x7f0000007640)="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", 0xe88}], 0x1, 0x0, 0x0, 0x10}], 0x1, 0x291448f9a8f1e2af) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 03:33:33 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x0) gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresuid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in=@remote, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000b40)=0xe8) getegid() getresuid(&(0x7f00000026c0), &(0x7f0000002700), &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002780)) stat(&(0x7f0000002b00)='./file0\x00', &(0x7f0000002b40)) stat(&(0x7f0000002bc0)='./file0\x00', &(0x7f0000002c00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002c80)={{{@in=@dev, @in=@local}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002d80)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000004440)) getgid() getresuid(&(0x7f00000044c0), &(0x7f0000004500), &(0x7f0000004540)) getresgid(&(0x7f0000004580), &(0x7f00000045c0), &(0x7f0000004600)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004640)={{{@in=@multicast1, @in6=@ipv4={[], [], @loopback}}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000004740)=0xe8) lstat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004840), &(0x7f0000004880)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000048c0), &(0x7f0000004900)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000004940)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) lstat(&(0x7f0000005d40)='./file0\x00', &(0x7f0000005d80)) lstat(&(0x7f0000005e00)='./file0\x00', &(0x7f0000005e40)) fstat(0xffffffffffffffff, &(0x7f0000005ec0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005f40)={{{@in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000006040)=0xe8) getgroups(0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@remote}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f00000061c0)=0xe8) stat(&(0x7f0000006200)='./file0\x00', &(0x7f0000006240)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000063c0), 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:33 executing program 4: keyctl$set_reqkey_keyring(0x5, 0x1b2c23e7) clock_gettime(0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a6412fafa9086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:33 executing program 4: keyctl$set_reqkey_keyring(0x5, 0x1b2c23e7) clock_gettime(0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a6412fafa9086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:34 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x7fffffff, 0x80) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000017c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002cc0)={{{@in6=@remote, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000002dc0)=0xe8) lstat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) getpid() fstat(r0, &(0x7f0000002f00)) getgid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002f80)) stat(&(0x7f0000002fc0)='./file0\x00', &(0x7f0000003000)) getgroups(0x3, &(0x7f0000003080)=[0x0, 0xee01, 0xee01]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000004cc0)) geteuid() getgroups(0x6, &(0x7f0000004d00)=[0xffffffffffffffff, 0xee01, 0xee00, 0x0, 0xee00, 0xee01]) fcntl$getown(r0, 0x9) getuid() getegid() getegid() gettid() stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) stat(&(0x7f0000005200)='./file0\x00', &(0x7f0000005240)) sendmmsg$unix(r1, &(0x7f00000086c0)=[{&(0x7f0000005340)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000008640)=[{&(0x7f0000007640)="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", 0xe88}], 0x1, 0x0, 0x0, 0x10}], 0x1, 0x291448f9a8f1e2af) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 03:33:34 executing program 4: keyctl$set_reqkey_keyring(0x5, 0x1b2c23e7) clock_gettime(0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a6412fafa9086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:34 executing program 5: syz_open_dev$loop(&(0x7f0000000980)='/dev/loop#\x00', 0x0, 0x101000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000001180)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgget(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)) getresgid(&(0x7f0000000880), &(0x7f0000000940), &(0x7f0000000680)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in=@rand_addr, @in=@remote}}, {{}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000500)=0xc) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000006c0)) accept$alg(0xffffffffffffffff, 0x0, 0x0) eventfd(0x0) inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) memfd_create(&(0x7f0000000780)='\x00', 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vhci\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000740)='cgroup.type\x00', 0x2, 0x0) inotify_init() openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000800)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000007c0)) syz_execute_func(&(0x7f00000008c0)="26656436660f2a3e8055a07a7a69ef69dc00d990c841ff0f185c38d4c4022d9b65fec19086d9f28fc9e5e543ddce2b74742e1a1ac4415d71d40031a3b786e2987f") ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000040)) 03:33:34 executing program 1: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffb) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000840)) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) request_key(&(0x7f0000000800)='blacklist\x00', &(0x7f0000000880), &(0x7f0000000740)='/dev/ppp\x00', 0x0) pivot_root(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000a00)=""/243) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000009c0), 0x8) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 03:33:34 executing program 4: keyctl$set_reqkey_keyring(0x5, 0x1b2c23e7) clock_gettime(0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a6412fafa9086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:34 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x7fffffff, 0x80) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000017c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002cc0)={{{@in6=@remote, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000002dc0)=0xe8) lstat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) getpid() fstat(r0, &(0x7f0000002f00)) getgid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002f80)) stat(&(0x7f0000002fc0)='./file0\x00', &(0x7f0000003000)) getgroups(0x3, &(0x7f0000003080)=[0x0, 0xee01, 0xee01]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000004cc0)) geteuid() getgroups(0x6, &(0x7f0000004d00)=[0xffffffffffffffff, 0xee01, 0xee00, 0x0, 0xee00, 0xee01]) fcntl$getown(r0, 0x9) getuid() getegid() getegid() gettid() stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) stat(&(0x7f0000005200)='./file0\x00', &(0x7f0000005240)) sendmmsg$unix(r1, &(0x7f00000086c0)=[{&(0x7f0000005340)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000008640)=[{&(0x7f0000007640)="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", 0xe88}], 0x1, 0x0, 0x0, 0x10}], 0x1, 0x291448f9a8f1e2af) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 03:33:34 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x0) gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresuid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in=@remote, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000b40)=0xe8) getegid() getresuid(&(0x7f00000026c0), &(0x7f0000002700), &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002780)) stat(&(0x7f0000002b00)='./file0\x00', &(0x7f0000002b40)) stat(&(0x7f0000002bc0)='./file0\x00', &(0x7f0000002c00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002c80)={{{@in=@dev, @in=@local}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002d80)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000004440)) getgid() getresuid(&(0x7f00000044c0), &(0x7f0000004500), &(0x7f0000004540)) getresgid(&(0x7f0000004580), &(0x7f00000045c0), &(0x7f0000004600)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004640)={{{@in=@multicast1, @in6=@ipv4={[], [], @loopback}}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000004740)=0xe8) lstat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004840), &(0x7f0000004880)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000048c0), &(0x7f0000004900)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000004940)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) lstat(&(0x7f0000005d40)='./file0\x00', &(0x7f0000005d80)) lstat(&(0x7f0000005e00)='./file0\x00', &(0x7f0000005e40)) fstat(0xffffffffffffffff, &(0x7f0000005ec0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005f40)={{{@in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000006040)=0xe8) getgroups(0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@remote}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f00000061c0)=0xe8) stat(&(0x7f0000006200)='./file0\x00', &(0x7f0000006240)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000063c0), 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:34 executing program 0: keyctl$set_reqkey_keyring(0x1d, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) delete_module(&(0x7f0000000400)="292c65762d766d6e6574382100b20c754beb04c44ff2d9d54b946d37870ab4967063d903f3438084a8e25e0b45b495748a928c5898cb880454506aa6ca7e8eec076a199ed290017dd435defc3c9b562580d922ae06192d5ca5b15b0018ee3ef62560d7358afd4be83d8e181f3a44121774a1e026a0f3f270fa5ee032a956a00ff00c12c4", 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000280)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getuid() getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:34 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x7fffffff, 0x80) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000017c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002cc0)={{{@in6=@remote, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000002dc0)=0xe8) lstat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) getpid() fstat(r0, &(0x7f0000002f00)) getgid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002f80)) stat(&(0x7f0000002fc0)='./file0\x00', &(0x7f0000003000)) getgroups(0x3, &(0x7f0000003080)=[0x0, 0xee01, 0xee01]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000004cc0)) geteuid() getgroups(0x6, &(0x7f0000004d00)=[0xffffffffffffffff, 0xee01, 0xee00, 0x0, 0xee00, 0xee01]) fcntl$getown(r0, 0x9) getuid() getegid() getegid() gettid() stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) stat(&(0x7f0000005200)='./file0\x00', &(0x7f0000005240)) sendmmsg$unix(r1, &(0x7f00000086c0)=[{&(0x7f0000005340)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000008640)=[{&(0x7f0000007640)="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", 0xe88}], 0x1, 0x0, 0x0, 0x10}], 0x1, 0x291448f9a8f1e2af) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 03:33:35 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x7fffffff, 0x80) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000017c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002cc0)={{{@in6=@remote, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000002dc0)=0xe8) lstat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) getpid() fstat(r0, &(0x7f0000002f00)) getgid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002f80)) stat(&(0x7f0000002fc0)='./file0\x00', &(0x7f0000003000)) getgroups(0x3, &(0x7f0000003080)=[0x0, 0xee01, 0xee01]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000004cc0)) geteuid() getgroups(0x6, &(0x7f0000004d00)=[0xffffffffffffffff, 0xee01, 0xee00, 0x0, 0xee00, 0xee01]) fcntl$getown(r0, 0x9) getuid() getegid() getegid() gettid() stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) stat(&(0x7f0000005200)='./file0\x00', &(0x7f0000005240)) sendmmsg$unix(r1, &(0x7f00000086c0)=[{&(0x7f0000005340)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000008640)=[{&(0x7f0000007640)="1289af425c5de4cbd4ca8e39ea822ceffd7c46ae822277a7f49f254ed2ca23be3293913dedbbaeb08cac7123d5db7c1297f2fbd4b47b4fbdee62153a0d41460a8a611ff003f9c35ec764b2f10997c27dfa64c6199fe148de28b9f9449aa6345c7c15087a6844c8956773768b95f96fb8437dda7a6228032f41a941c537ee6cbeadc4b5e815a2d85e1d601515adbe2dc9c3c137c5bec0cef187374d21a36d925c4cd3097615e14eea747469693263e7d258affa50f15d1e8e3394dfa4a91594a3b42da515c04b1ef3cda1d22c589014f746f74a191c366c9becd47e099dab626b1fcefa95806008da01905b8e37277b4444152455f075a0541f62ced532eaf73fded4df2e768ba519e710893d4beebdcf1c89423944a5f048d57b110e9b1d0a4e1d079c082c8af044fbca8c98c60094516405ae113fe552364e5bd9b3aeabaf58fef3dc5a9b5acafcbfa8111d397bbb2536948c0fb51683605a058097bdec6b9957f8f1cf01e2848a5750efc1f848d36d43ab1489c5d2a7469695489f91b62de3b4f4d8f4138701fd4422f25dafebf8cfae3f7926c47e2907ac0247a3b6e79126c3de893db52e8493e18fe03615ff27531da29b4c5b1a99a36a622ec3111d1b0bf0bb6c1df75be5a18778df8e0d2df2e261ee31698f9e205575378b25fecfff9f64496c729bb28ac6a2acc9a846217b275b56746b31ab2913eb20a5d60382d515aa7b7cc3633386c9e039f8c32c32b251e95baf1e09fea4875a7fa3ac289619db9cbc647dff8bd929eedee3f6ea925963925dd6be430ff16de731a9a2555ef747e89c7425cef7fc1277b5aac1a74baa904783089c220f94d3a18f2612c1537aceaee5d6e96c99e1582be93f6a19e9db69159da674f17989792a7c9fc28b1b070600d5e80244738333f207b91d7a0dc8c4d5b0c98c706244ef60595d009ff6f58231ce2f7d2087dcf16c5ef4513a78648b8b8af8291efe0dac4cdad47adc495ba469251c039123b00117e0eec4bc81d65e88cb36ce46fb8a274bc93e167c7aeb9fa717d6460c68fd3eb68b4c39e42b99c2619c0e2a326aa312fdefcd6d15d87ec8fb65cc8a4d80969e88548ad839eb552ec5a4cb6d2182c1ba5dc0dda1d8c1d6667e8f71706a28f171282dabfc3c3d8e60d3e7d681b46b26c5fe6ce881a14dfd79328cf3561e4ceaf3fd43bfe0cad0a23c5d0df1649b6f4b1c74468addac9e8a896527b27f28c7297be42bcc72017f239758f11f1b8e5de2b7d43cf7db882337f971b1a5d2fee2be8543b71466c3206c6b0bafe728e797a9d28eccbb68c92966c7b7b20a64e63a5f04987177977c5b1b2c17bddde593a4e837f7ecf6b13da612bb837d59fa0ca28964fd3c9cccc3b0b79f4f7dafe1d6386a46965f807f7be9658a5361c0495547f9ce493d27ed02744a9adf203d9bc5356faa40fe2e032176525da0ebd9c459b7fd85a1de25e26c3d2b9b6a97b128a4e6240001b7179bf555f645ea31c1c3c8072349333c4eebcfcba43755b0f9010f8a7d66a9b452aacc3cdcf2a93f5a71333e31c871c8152ea31d7559d0a7f825024860d513a319c2639fe54cb7d9d0559722382b556d0ab70f5ef074e51545bc7dcc4e83fb87d8f5081a5bc053bc6e1ea66787d095b732e26de187ca57476fe9e2f04fa5b6ed596ac4ba6755077fd5b51fe3aa2187398d62b374baad4bc04e2d747b0e0093be8439ebf72aca12eea64a7f75fc13213757109a1910275929f14b74961bb4e19dfe28e8cbb6b7743880f455596c5c4e4f7dfa8d44ad3b3b1ced30ac99375928a73ec6e4f8f77b680f9e5d22a227db08344f697c8502dee79914f7c366644a5f7659022cc8e294c1879b434c55e73be1ef7cd31dcbb37f10200008be522e6e127153cb65bb6a4b4f2bf605690cc833f2f6ee37d665fe3d8eb86a8ddbd7512eb83e352a0621e671bf9c3245a598e6e82a9d7b52aeb8cdabf08246f2d759dd95eb330fe378e6c56e035685afe46e3e77b0a6841432977b2ea7293e2289cd2c853d7d38d4306b5bba564a9e8e36cde34ce875ce233a66f6c462f9e471246bff1f67111639013efd20d4fe3f77f49df7f22b603086b80e8e82bb310a34a7612cd0501912df34d21381d9fffcf02e321b5f6bf503c1485536c2675b61678cfe2bfb2809b74623f30c65ed4681d46b0b9dd0cb9f3eba22ff240f3945f432010ada1ec8ffe68d0f8e41855b419421994ccb6186fc431cb2e36732127069727bb69c7d9b616ff7bc825606e1d1695550b72178ac3a5f5540af554a6c8dc6bc3bd9b6093120f90fae28c39f29677dc444d95cf20cde21a26832bc500871c5d72bca99e89f423970a7a4feb7dcb2450ef9faa211d23a1edeae1d1e1a1ffd57943a62d5e72c035150500e8a246e019b7261ba969e4e52abdbf1a6c52b624e6fa0d696a3f7f0023831c320b3ad9e334e7b945d97558c71c92697f1b2e2351ababd444321f27a035539a113cee23f2a4fb19c2e32c28883fc80c1bc9c6ac849e9dee07dd8d24cc560c87cb0aa3e413d11814a3620b334b66c6bbbdea158263c73f54f790b318e50d929b14cca36fddf9074a7fe1efb561f0f80a71fb59aaf4d8d08b7b500acff84242be7689bdc6b9264becce713eacd185cfc3c6abd9122cf0115ef8711491feb01444d372bbe590beae95e63b5bf3e81897594b007ab383e5e402aa823bc6965e04d6a4bc77ed8a4b4112c13057ad71b15563b5b240fd8dcbb04612869b5832505849919696d461602c1a10296c7dd1a3b27b54f4c19dcd88f7749b2e94edc837db2fdd71785c895931539bd7fcd946b54e7e991cba430e42526d471f383889c54420c5c60b639baca9f2b82bad299fe1887d11c41760c7d4dd87ec8b46f40c0572dec1c76f2b566d71fabc4cac1481ae99a2e72750d3825ae36ed4a5587c44bef6da9b8fe755666b36792476c3791bfd6913740ce8667081437d6d4cf6e1568fe4353baa08e9aab3dbb3ad3146ca203466c801e2a0337ccfaf0bdf8e23cf4845f7ff048d0abd8a4a36d218d58dde95da52343714664044d3decf438817dbe240f9903d63663edcc5ff88cf60aa9b8ac829231d17ddaee41162fc7c891a0dc4613d2d9926205e041320bbc82a115efe27b4634ef63d6fa0dd23e9a570bc7e8d729e95079ee7580599cd350a6a5f62dfe26e5e4ba2820f68d6cbfdfd2a51f0fcedcfc8be748a85776f31f217682c5bea77a035f2a777fb3914f0401016ae6d5ea4e69955b40b078a7efaf93156602c1ec9c48d3b247d9412407aeb64fbbbac3814cacbbe220134087a1429384a0e2f98e71875e5b9a348f1023f7aab439e63be6f977a406220eb0b7b9b165089657f112e9c0ffef2469d7838a1e3913a5613202cbc21d2b5d6c40494e4426ddab17f261ef1a5e91a0f6e74b99f3e72dbfe72ec287576f0ea8444494c2e4eb1334d89ccda5b6b9b971e5b07ad517ae8da2092edcd76afbccade96d5200e317dbb35eb938434f3d962385d4e1572293cdccc000f026c87d5fadbce1e5f731a14f174a49724cbe9a572426b4df9ac77c73620e5c0d4b9031ac3800c5aa9f99d3e54d7d3a25241758b0f72085127a55478a2c05ebc32c141cc898bd95b652f00697c94800111204b8e2741d88071f39617d6443863e9e9920eb37106ed53a406c361c50261868353d868650f865ad75b48708287e4ed07de3bf12d3ef59af4f7a6586d3e4536dca94e67d2e8bfe9037791a78d618493fd5dc76e2d9cfafa336e303d4ed7c1b9dfa3592389592ef7f3b8f7c657062e1ce99d35c07f75d9bb32c3a536450a60453be983e95104c58cb98b8ba824a409b11f8705a480b91ee360feac2fa450d7449588926cfe5b66743bddbfa17a8e218b834980d41fc29784f79afebabb51ea6136a3ac4c4b20a1ed2eb6a23cdd56e580b5094d0ba11f313d826bd861c1bbadfa07d62ae862642dbda676264862ac44ef8feaabab5d762b71d36d8e9a01be8660a60047f9e92cb67f4ed48125fb11f29fb627da658f57724db6fdf07739141ac248354480b2d9dda951a1212552c1e0215f41d862fddc7eb85ceec374dc6d0f9512fa85b3ec5643e5eb151e44c5cbe33bd0326d496f5d67bad234ce01c39c3b5911287245024fed65d59859ebe976fc8c758dc56a6781c343113c02f5e5efed3692df46d91970880925ee0743a9f36a07cf8c5ba4c45c7050a31a04f12735c2a5c10e894c3208f1c0d702290242c47d8376684e693102e04ac6a9b86110909d23316c638042947c26b37a66ed2d977a5fe8379e3090846cc03bdfe9efb6aa3130fc40906b56b8cc82a86b360904bf8924a9b4a1098f37942bef14215c23f62079d3594ce3f8ab9badab004a4a9a10c0f2f87c0b13b8078c299953d605ca9246be795baa1cd0cd511ec58e34216d09f8d3c552f8c49d0d73d7468ff608f9051431a6da414a7b4ef4140cd59193c388afc0e6df84018d47bb72f64481a2c4c6ed03776e69af21ffdf5b50ea1b124a278614fb2fdbe34bef93817c98fa2eee4afd7fe05df62a79edecaaae69bc858ddadce514cec064180f1b8d00dc367471ff3a46a10df42e8d844573d834c19262bbd9bff3987cb6e93cf3253f074f77da047e4d26cf9bc7c25ffae403be600f673ebd86b0673cd3061c4faefa58b0abf79decb6496c10ef355611264bb7880e93c06b40c7f1e5112475ac3d81549aea59ebf41ebd3c11af54e5abc0099eb59bea5581b3c3643d6ca69020833899caf59c848207a6a4c8464459e4aad03b80a35ca012fbc7c6575b3c120ae38a9de005ed0af3f0b9f04b5b28bacb1a4d6cd858a53de4a41c4285aeb096c0d7719b6f934259f945d12ec97d3e33c6fa47876a8cc4b766933b41d3e906a44d96594161542664e9ce4a3fb09ecd2998f532adbe4ce0ce6c5cb1b8b0e406e8a6398961de88f28d6fefefaa82bcca6be4f6921f110c30552b1a890e57638bf53f17b8a646852e9e04fae875dd7ef6c692d8bd88e328eed680f3daec29f35995a31c2016a455ff44754066074046538e25759d01ac5aaf6195bc329510e54ba5b6b44050b8bf4466662c5f514e271a1646733fba56ddaec76f6a86fba542a245307269b20fd63c7788b32026e47ff112c6d3fdaf86f89d16e46a3f34d558daa12a108aca2b475d9de11f4c6831be13f894a34ec096f4b5663f9db55af9ca92cce6ba3e6eb90c5ed5b7c7fd59268e4a5c446be7cbd609b4135cf1c1dc428184ba6d505e2d8d351f0", 0xe88}], 0x1, 0x0, 0x0, 0x10}], 0x1, 0x291448f9a8f1e2af) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 03:33:35 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x7fffffff, 0x80) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000017c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002cc0)={{{@in6=@remote, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000002dc0)=0xe8) lstat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) getpid() fstat(r0, &(0x7f0000002f00)) getgid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002f80)) stat(&(0x7f0000002fc0)='./file0\x00', &(0x7f0000003000)) getgroups(0x3, &(0x7f0000003080)=[0x0, 0xee01, 0xee01]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000004cc0)) geteuid() getgroups(0x6, &(0x7f0000004d00)=[0xffffffffffffffff, 0xee01, 0xee00, 0x0, 0xee00, 0xee01]) fcntl$getown(r0, 0x9) getuid() getegid() getegid() gettid() stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) stat(&(0x7f0000005200)='./file0\x00', &(0x7f0000005240)) sendmmsg$unix(r1, &(0x7f00000086c0)=[{&(0x7f0000005340)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000008640)=[{&(0x7f0000007640)="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", 0xe88}], 0x1, 0x0, 0x0, 0x10}], 0x1, 0x291448f9a8f1e2af) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 03:33:35 executing program 1: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffb) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000840)) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) request_key(&(0x7f0000000800)='blacklist\x00', &(0x7f0000000880), &(0x7f0000000740)='/dev/ppp\x00', 0x0) pivot_root(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000a00)=""/243) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000009c0), 0x8) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 03:33:35 executing program 5: syz_open_dev$loop(&(0x7f0000000980)='/dev/loop#\x00', 0x0, 0x101000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000001180)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgget(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)) getresgid(&(0x7f0000000880), &(0x7f0000000940), &(0x7f0000000680)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in=@rand_addr, @in=@remote}}, {{}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000500)=0xc) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000006c0)) accept$alg(0xffffffffffffffff, 0x0, 0x0) eventfd(0x0) inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) memfd_create(&(0x7f0000000780)='\x00', 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vhci\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000740)='cgroup.type\x00', 0x2, 0x0) inotify_init() openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000800)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000007c0)) syz_execute_func(&(0x7f00000008c0)="26656436660f2a3e8055a07a7a69ef69dc00d990c841ff0f185c38d4c4022d9b65fec19086d9f28fc9e5e543ddce2b74742e1a1ac4415d71d40031a3b786e2987f") ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000040)) 03:33:35 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000280)='\t\x00', 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x10000, 0x88a00) write$P9_RCREATE(r0, &(0x7f0000000140)={0x18, 0x73, 0x2, {{0x1, 0x0, 0x8}, 0x1ce}}, 0x18) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2040, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x17cd, &(0x7f00000005c0)=ANY=[]) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x79fd, &(0x7f0000000240)=ANY=[]) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) msgget(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), 0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) 03:33:35 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x7fffffff, 0x80) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000017c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002cc0)={{{@in6=@remote, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000002dc0)=0xe8) lstat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) getpid() fstat(r0, &(0x7f0000002f00)) getgid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002f80)) stat(&(0x7f0000002fc0)='./file0\x00', &(0x7f0000003000)) getgroups(0x3, &(0x7f0000003080)=[0x0, 0xee01, 0xee01]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000004cc0)) geteuid() getgroups(0x6, &(0x7f0000004d00)=[0xffffffffffffffff, 0xee01, 0xee00, 0x0, 0xee00, 0xee01]) fcntl$getown(r0, 0x9) getuid() getegid() getegid() gettid() stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) stat(&(0x7f0000005200)='./file0\x00', &(0x7f0000005240)) sendmmsg$unix(r1, &(0x7f00000086c0)=[{&(0x7f0000005340)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000008640)=[{&(0x7f0000007640)="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", 0xe88}], 0x1, 0x0, 0x0, 0x10}], 0x1, 0x291448f9a8f1e2af) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 03:33:35 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x0) gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresuid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in=@remote, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000b40)=0xe8) getegid() getresuid(&(0x7f00000026c0), &(0x7f0000002700), &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002780)) stat(&(0x7f0000002b00)='./file0\x00', &(0x7f0000002b40)) stat(&(0x7f0000002bc0)='./file0\x00', &(0x7f0000002c00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002c80)={{{@in=@dev, @in=@local}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002d80)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000004440)) getgid() getresuid(&(0x7f00000044c0), &(0x7f0000004500), &(0x7f0000004540)) getresgid(&(0x7f0000004580), &(0x7f00000045c0), &(0x7f0000004600)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004640)={{{@in=@multicast1, @in6=@ipv4={[], [], @loopback}}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000004740)=0xe8) lstat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004840), &(0x7f0000004880)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000048c0), &(0x7f0000004900)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000004940)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) lstat(&(0x7f0000005d40)='./file0\x00', &(0x7f0000005d80)) lstat(&(0x7f0000005e00)='./file0\x00', &(0x7f0000005e40)) fstat(0xffffffffffffffff, &(0x7f0000005ec0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005f40)={{{@in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000006040)=0xe8) getgroups(0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@remote}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f00000061c0)=0xe8) stat(&(0x7f0000006200)='./file0\x00', &(0x7f0000006240)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000063c0), 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:35 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000280)='\t\x00', 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x10000, 0x88a00) write$P9_RCREATE(r0, &(0x7f0000000140)={0x18, 0x73, 0x2, {{0x1, 0x0, 0x8}, 0x1ce}}, 0x18) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2040, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x17cd, &(0x7f00000005c0)=ANY=[]) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x79fd, &(0x7f0000000240)=ANY=[]) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) msgget(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), 0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) 03:33:35 executing program 0: keyctl$set_reqkey_keyring(0x1d, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) delete_module(&(0x7f0000000400)="292c65762d766d6e6574382100b20c754beb04c44ff2d9d54b946d37870ab4967063d903f3438084a8e25e0b45b495748a928c5898cb880454506aa6ca7e8eec076a199ed290017dd435defc3c9b562580d922ae06192d5ca5b15b0018ee3ef62560d7358afd4be83d8e181f3a44121774a1e026a0f3f270fa5ee032a956a00ff00c12c4", 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000280)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getuid() getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:35 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000280)='\t\x00', 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x10000, 0x88a00) write$P9_RCREATE(r0, &(0x7f0000000140)={0x18, 0x73, 0x2, {{0x1, 0x0, 0x8}, 0x1ce}}, 0x18) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2040, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x17cd, &(0x7f00000005c0)=ANY=[]) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x79fd, &(0x7f0000000240)=ANY=[]) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) msgget(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), 0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) 03:33:35 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000280)='\t\x00', 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x10000, 0x88a00) write$P9_RCREATE(r0, &(0x7f0000000140)={0x18, 0x73, 0x2, {{0x1, 0x0, 0x8}, 0x1ce}}, 0x18) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2040, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x17cd, &(0x7f00000005c0)=ANY=[]) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x79fd, &(0x7f0000000240)=ANY=[]) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) msgget(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), 0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) 03:33:36 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000280)='\t\x00', 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x10000, 0x88a00) write$P9_RCREATE(r0, &(0x7f0000000140)={0x18, 0x73, 0x2, {{0x1, 0x0, 0x8}, 0x1ce}}, 0x18) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2040, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x17cd, &(0x7f00000005c0)=ANY=[]) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x79fd, &(0x7f0000000240)=ANY=[]) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) msgget(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), 0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) 03:33:36 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000280)='\t\x00', 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x10000, 0x88a00) write$P9_RCREATE(r0, &(0x7f0000000140)={0x18, 0x73, 0x2, {{0x1, 0x0, 0x8}, 0x1ce}}, 0x18) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2040, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x17cd, &(0x7f00000005c0)=ANY=[]) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x79fd, &(0x7f0000000240)=ANY=[]) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) msgget(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), 0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) 03:33:36 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000280)='\t\x00', 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x10000, 0x88a00) write$P9_RCREATE(r0, &(0x7f0000000140)={0x18, 0x73, 0x2, {{0x1, 0x0, 0x8}, 0x1ce}}, 0x18) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2040, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x17cd, &(0x7f00000005c0)=ANY=[]) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x79fd, &(0x7f0000000240)=ANY=[]) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) msgget(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), 0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) 03:33:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000280)='\t\x00', 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x10000, 0x88a00) write$P9_RCREATE(r0, &(0x7f0000000140)={0x18, 0x73, 0x2, {{0x1, 0x0, 0x8}, 0x1ce}}, 0x18) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2040, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x17cd, &(0x7f00000005c0)=ANY=[]) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x79fd, &(0x7f0000000240)=ANY=[]) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) msgget(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), 0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) 03:33:36 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000280)='\t\x00', 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x10000, 0x88a00) write$P9_RCREATE(r0, &(0x7f0000000140)={0x18, 0x73, 0x2, {{0x1, 0x0, 0x8}, 0x1ce}}, 0x18) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2040, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x17cd, &(0x7f00000005c0)=ANY=[]) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x79fd, &(0x7f0000000240)=ANY=[]) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) msgget(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), 0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) 03:33:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000040)={0x14, 0x2c, 0x7ffff, 0x0, 0x0, {0x1, 0xffffff9e}}, 0x14}}, 0x0) 03:33:36 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @local}}, 0x0, 0x19469401, 0x100000001, "88b80c31b0899714621b9843aff072a99e231912cbb5985af91cc94bdaf364a6257b11b324be86e8cedaa792ca99b25bab296be434e275030361f082e6b16b25feb12188d69b9deebb396aebfb6eb641"}, 0xd8) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) chmod(&(0x7f0000000000)='./file0\x00', 0x0) 03:33:36 executing program 3: keyctl$set_reqkey_keyring(0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) delete_module(&(0x7f0000000400)="292c65762d766d6e6574382100b20c754beb04c44ff2d9d54b946d37870ab4967063d903f3438084a8e25e0b45b495748a928c5898cb880454506aa6ca7e8eec076a199ed290017dd435defc3c9b562580d922ae06192d5ca5b15b0018ee3ef62560d7358afd4be83d8e181f3a44121774a1e026a0f3f270fa5ee032a956a00ff00c12c4", 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000280)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getuid() getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) getuid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:36 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @local}}, 0x0, 0x19469401, 0x100000001, "88b80c31b0899714621b9843aff072a99e231912cbb5985af91cc94bdaf364a6257b11b324be86e8cedaa792ca99b25bab296be434e275030361f082e6b16b25feb12188d69b9deebb396aebfb6eb641"}, 0xd8) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) chmod(&(0x7f0000000000)='./file0\x00', 0x0) 03:33:36 executing program 0: keyctl$set_reqkey_keyring(0x1d, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) delete_module(&(0x7f0000000400)="292c65762d766d6e6574382100b20c754beb04c44ff2d9d54b946d37870ab4967063d903f3438084a8e25e0b45b495748a928c5898cb880454506aa6ca7e8eec076a199ed290017dd435defc3c9b562580d922ae06192d5ca5b15b0018ee3ef62560d7358afd4be83d8e181f3a44121774a1e026a0f3f270fa5ee032a956a00ff00c12c4", 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000280)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getuid() getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000040)={0x14, 0x2c, 0x7ffff, 0x0, 0x0, {0x1, 0xffffff9e}}, 0x14}}, 0x0) 03:33:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000280)='\t\x00', 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x10000, 0x88a00) write$P9_RCREATE(r0, &(0x7f0000000140)={0x18, 0x73, 0x2, {{0x1, 0x0, 0x8}, 0x1ce}}, 0x18) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2040, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x17cd, &(0x7f00000005c0)=ANY=[]) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x79fd, &(0x7f0000000240)=ANY=[]) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) msgget(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), 0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) 03:33:36 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000280)='\t\x00', 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x10000, 0x88a00) write$P9_RCREATE(r0, &(0x7f0000000140)={0x18, 0x73, 0x2, {{0x1, 0x0, 0x8}, 0x1ce}}, 0x18) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2040, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x17cd, &(0x7f00000005c0)=ANY=[]) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x79fd, &(0x7f0000000240)=ANY=[]) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) msgget(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), 0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) 03:33:36 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @local}}, 0x0, 0x19469401, 0x100000001, "88b80c31b0899714621b9843aff072a99e231912cbb5985af91cc94bdaf364a6257b11b324be86e8cedaa792ca99b25bab296be434e275030361f082e6b16b25feb12188d69b9deebb396aebfb6eb641"}, 0xd8) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) chmod(&(0x7f0000000000)='./file0\x00', 0x0) 03:33:36 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @local}}, 0x0, 0x19469401, 0x100000001, "88b80c31b0899714621b9843aff072a99e231912cbb5985af91cc94bdaf364a6257b11b324be86e8cedaa792ca99b25bab296be434e275030361f082e6b16b25feb12188d69b9deebb396aebfb6eb641"}, 0xd8) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) chmod(&(0x7f0000000000)='./file0\x00', 0x0) 03:33:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000040)={0x14, 0x2c, 0x7ffff, 0x0, 0x0, {0x1, 0xffffff9e}}, 0x14}}, 0x0) 03:33:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000280)='\t\x00', 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x10000, 0x88a00) write$P9_RCREATE(r0, &(0x7f0000000140)={0x18, 0x73, 0x2, {{0x1, 0x0, 0x8}, 0x1ce}}, 0x18) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2040, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x17cd, &(0x7f00000005c0)=ANY=[]) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x79fd, &(0x7f0000000240)=ANY=[]) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) msgget(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), 0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) 03:33:36 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000280)='\t\x00', 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x10000, 0x88a00) write$P9_RCREATE(r0, &(0x7f0000000140)={0x18, 0x73, 0x2, {{0x1, 0x0, 0x8}, 0x1ce}}, 0x18) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2040, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x17cd, &(0x7f00000005c0)=ANY=[]) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x79fd, &(0x7f0000000240)=ANY=[]) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) msgget(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), 0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) 03:33:36 executing program 4: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000640)="c10800000000000000331fe4ac141412e0", 0x11}], 0x1}, 0x0) 03:33:37 executing program 3: keyctl$set_reqkey_keyring(0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) delete_module(&(0x7f0000000400)="292c65762d766d6e6574382100b20c754beb04c44ff2d9d54b946d37870ab4967063d903f3438084a8e25e0b45b495748a928c5898cb880454506aa6ca7e8eec076a199ed290017dd435defc3c9b562580d922ae06192d5ca5b15b0018ee3ef62560d7358afd4be83d8e181f3a44121774a1e026a0f3f270fa5ee032a956a00ff00c12c4", 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000280)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getuid() getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) getuid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000040)={0x14, 0x2c, 0x7ffff, 0x0, 0x0, {0x1, 0xffffff9e}}, 0x14}}, 0x0) 03:33:37 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000980)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)) getresgid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001540)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001580)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000001680)=0xe8) getresgid(&(0x7f00000016c0), &(0x7f0000001700), &(0x7f0000001740)) gettid() getresuid(&(0x7f0000001780), &(0x7f00000017c0), &(0x7f0000001800)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001c80)='./file0\x00', &(0x7f0000001cc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001d40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d80)={{{@in=@remote}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000001e80)=0xe8) getgroups(0x0, &(0x7f0000001ec0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002500)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002540)={{{@in6=@remote, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000002640)=0xe8) getgroups(0x0, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002880)) stat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) getgid() getpid() getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getgroups(0x0, &(0x7f0000002e00)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002e40)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003000)='\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003080)={{{@in=@local, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000003180)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003240), &(0x7f0000003280)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000032c0)={{{@in=@remote, @in6=@mcast1}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f00000033c0)=0xe8) getgroups(0x0, &(0x7f0000003400)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0x8) fstat(0xffffffffffffffff, &(0x7f0000003500)) getpgid(0xffffffffffffffff) getuid() getegid() getpgid(0x0) stat(&(0x7f0000003980)='./file0\x00', &(0x7f00000039c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a40), &(0x7f0000003a80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ac0), &(0x7f0000003b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b40)={{{@in=@remote, @in6=@local}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000003c40)=0xe8) getgroups(0x0, &(0x7f0000003c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003d40), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 03:33:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") prctl$setname(0xf, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000140), 0x0) clock_gettime(0x0, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000200)) getpid() timer_create(0x0, &(0x7f0000000300), &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000080)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000200), 0xffffff57, &(0x7f00000001c0)={&(0x7f00000002c0)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x123, 0x0, 0x0, {{{@in6=@ipv4={[], [], @local}}, {@in6=@ipv4={[], [], @broadcast}, 0x0, 0x6c}, @in6}}}, 0xf8}, 0x8}, 0x0) 03:33:37 executing program 4: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000640)="c10800000000000000331fe4ac141412e0", 0x11}], 0x1}, 0x0) 03:33:37 executing program 3: keyctl$set_reqkey_keyring(0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) delete_module(&(0x7f0000000400)="292c65762d766d6e6574382100b20c754beb04c44ff2d9d54b946d37870ab4967063d903f3438084a8e25e0b45b495748a928c5898cb880454506aa6ca7e8eec076a199ed290017dd435defc3c9b562580d922ae06192d5ca5b15b0018ee3ef62560d7358afd4be83d8e181f3a44121774a1e026a0f3f270fa5ee032a956a00ff00c12c4", 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000280)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getuid() getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) getuid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:37 executing program 0: prctl$intptr(0x400000000021, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") [ 1206.991407] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 03:33:37 executing program 4: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000640)="c10800000000000000331fe4ac141412e0", 0x11}], 0x1}, 0x0) [ 1207.051484] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 03:33:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000200), 0xffffff57, &(0x7f00000001c0)={&(0x7f00000002c0)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x123, 0x0, 0x0, {{{@in6=@ipv4={[], [], @local}}, {@in6=@ipv4={[], [], @broadcast}, 0x0, 0x6c}, @in6}}}, 0xf8}, 0x8}, 0x0) 03:33:37 executing program 0: prctl$intptr(0x400000000021, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") prctl$setname(0xf, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000140), 0x0) clock_gettime(0x0, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000200)) getpid() timer_create(0x0, &(0x7f0000000300), &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000080)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:37 executing program 4: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000640)="c10800000000000000331fe4ac141412e0", 0x11}], 0x1}, 0x0) [ 1207.202069] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 03:33:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000200), 0xffffff57, &(0x7f00000001c0)={&(0x7f00000002c0)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x123, 0x0, 0x0, {{{@in6=@ipv4={[], [], @local}}, {@in6=@ipv4={[], [], @broadcast}, 0x0, 0x6c}, @in6}}}, 0xf8}, 0x8}, 0x0) [ 1207.450118] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 03:33:38 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000980)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)) getresgid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001540)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001580)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000001680)=0xe8) getresgid(&(0x7f00000016c0), &(0x7f0000001700), &(0x7f0000001740)) gettid() getresuid(&(0x7f0000001780), &(0x7f00000017c0), &(0x7f0000001800)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001c80)='./file0\x00', &(0x7f0000001cc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001d40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d80)={{{@in=@remote}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000001e80)=0xe8) getgroups(0x0, &(0x7f0000001ec0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002500)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002540)={{{@in6=@remote, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000002640)=0xe8) getgroups(0x0, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002880)) stat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) getgid() getpid() getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getgroups(0x0, &(0x7f0000002e00)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002e40)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003000)='\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003080)={{{@in=@local, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000003180)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003240), &(0x7f0000003280)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000032c0)={{{@in=@remote, @in6=@mcast1}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f00000033c0)=0xe8) getgroups(0x0, &(0x7f0000003400)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0x8) fstat(0xffffffffffffffff, &(0x7f0000003500)) getpgid(0xffffffffffffffff) getuid() getegid() getpgid(0x0) stat(&(0x7f0000003980)='./file0\x00', &(0x7f00000039c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a40), &(0x7f0000003a80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ac0), &(0x7f0000003b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b40)={{{@in=@remote, @in6=@local}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000003c40)=0xe8) getgroups(0x0, &(0x7f0000003c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003d40), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 03:33:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="0a5cc8070031") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000003c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @control={0x0, 0x5}}], 0x30) r2 = dup2(r1, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)={'syz_tun\x00'}) fchdir(r2) 03:33:38 executing program 0: prctl$intptr(0x400000000021, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000200), 0xffffff57, &(0x7f00000001c0)={&(0x7f00000002c0)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x123, 0x0, 0x0, {{{@in6=@ipv4={[], [], @local}}, {@in6=@ipv4={[], [], @broadcast}, 0x0, 0x6c}, @in6}}}, 0xf8}, 0x8}, 0x0) 03:33:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") prctl$setname(0xf, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000140), 0x0) clock_gettime(0x0, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000200)) getpid() timer_create(0x0, &(0x7f0000000300), &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000080)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:38 executing program 3: keyctl$set_reqkey_keyring(0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) delete_module(&(0x7f0000000400)="292c65762d766d6e6574382100b20c754beb04c44ff2d9d54b946d37870ab4967063d903f3438084a8e25e0b45b495748a928c5898cb880454506aa6ca7e8eec076a199ed290017dd435defc3c9b562580d922ae06192d5ca5b15b0018ee3ef62560d7358afd4be83d8e181f3a44121774a1e026a0f3f270fa5ee032a956a00ff00c12c4", 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000280)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getuid() getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) getuid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") [ 1207.883463] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 03:33:38 executing program 0: prctl$intptr(0x400000000021, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:38 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000880)={{0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, {@broadcast}}, 0x44) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000700), 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") prctl$setname(0xf, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000140), 0x0) clock_gettime(0x0, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000200)) getpid() timer_create(0x0, &(0x7f0000000300), &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000080)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:39 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x0, 0xb, @mcast1={0xff, 0x1, [0x0, 0x300, 0x0, 0x0, 0x8000000, 0x100000000000000]}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000700)}, 0x0) 03:33:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000000000003a, 0x0, &(0x7f0000261f44)=""/188, &(0x7f0000000000)=0xbc) 03:33:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000040)={0x8, "907233dc30c1e1e0"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000000)="0f01c8b837000f00d867833800d9faba4100ec66b91208000066b80600000066ba000000000f30a7f26b23130f013d6d", 0x30}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:39 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000980)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)) getresgid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001540)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001580)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000001680)=0xe8) getresgid(&(0x7f00000016c0), &(0x7f0000001700), &(0x7f0000001740)) gettid() getresuid(&(0x7f0000001780), &(0x7f00000017c0), &(0x7f0000001800)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001c80)='./file0\x00', &(0x7f0000001cc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001d40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d80)={{{@in=@remote}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000001e80)=0xe8) getgroups(0x0, &(0x7f0000001ec0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002500)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002540)={{{@in6=@remote, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000002640)=0xe8) getgroups(0x0, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002880)) stat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) getgid() getpid() getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getgroups(0x0, &(0x7f0000002e00)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002e40)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003000)='\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003080)={{{@in=@local, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000003180)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003240), &(0x7f0000003280)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000032c0)={{{@in=@remote, @in6=@mcast1}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f00000033c0)=0xe8) getgroups(0x0, &(0x7f0000003400)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0x8) fstat(0xffffffffffffffff, &(0x7f0000003500)) getpgid(0xffffffffffffffff) getuid() getegid() getpgid(0x0) stat(&(0x7f0000003980)='./file0\x00', &(0x7f00000039c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a40), &(0x7f0000003a80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ac0), &(0x7f0000003b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b40)={{{@in=@remote, @in6=@local}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000003c40)=0xe8) getgroups(0x0, &(0x7f0000003c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003d40), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 03:33:39 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0xea) truncate(&(0x7f0000000040)='./bus\x00', 0x0) 03:33:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000000000003a, 0x0, &(0x7f0000261f44)=""/188, &(0x7f0000000000)=0xbc) 03:33:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000040)={0x8, "907233dc30c1e1e0"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000000)="0f01c8b837000f00d867833800d9faba4100ec66b91208000066b80600000066ba000000000f30a7f26b23130f013d6d", 0x30}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000040)={0x8, "907233dc30c1e1e0"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000000)="0f01c8b837000f00d867833800d9faba4100ec66b91208000066b80600000066ba000000000f30a7f26b23130f013d6d", 0x30}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000000000003a, 0x0, &(0x7f0000261f44)=""/188, &(0x7f0000000000)=0xbc) 03:33:39 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0xea) truncate(&(0x7f0000000040)='./bus\x00', 0x0) 03:33:39 executing program 2: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffe000/0x2000)=nil) getegid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0xfffffffffffffd7e, 0x0) msgget(0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000180)=""/18) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000340)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4), 0x2c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@loopback, @in6}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) setresuid(0x0, 0x0, 0x0) io_setup(0x0, &(0x7f0000000700)) io_submit(0x0, 0x0, &(0x7f0000000d40)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c80)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0be6969ef69dc00d96441fb0f1837370f38211a2e26f0011479c19086d9f28fc9410feefa4e2179fb010175450f2e1ac4010d64ac1e5d31a3b767e2989fc4e279795728") 03:33:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000000000003a, 0x0, &(0x7f0000261f44)=""/188, &(0x7f0000000000)=0xbc) 03:33:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000040)={0x8, "907233dc30c1e1e0"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000000)="0f01c8b837000f00d867833800d9faba4100ec66b91208000066b80600000066ba000000000f30a7f26b23130f013d6d", 0x30}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:39 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0xea) truncate(&(0x7f0000000040)='./bus\x00', 0x0) 03:33:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000040)={0x8, "907233dc30c1e1e0"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000000)="0f01c8b837000f00d867833800d9faba4100ec66b91208000066b80600000066ba000000000f30a7f26b23130f013d6d", 0x30}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:40 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000980)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)) getresgid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001540)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001580)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000001680)=0xe8) getresgid(&(0x7f00000016c0), &(0x7f0000001700), &(0x7f0000001740)) gettid() getresuid(&(0x7f0000001780), &(0x7f00000017c0), &(0x7f0000001800)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001c80)='./file0\x00', &(0x7f0000001cc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001d40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d80)={{{@in=@remote}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000001e80)=0xe8) getgroups(0x0, &(0x7f0000001ec0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002500)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002540)={{{@in6=@remote, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000002640)=0xe8) getgroups(0x0, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002880)) stat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) getgid() getpid() getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getgroups(0x0, &(0x7f0000002e00)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002e40)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003000)='\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003080)={{{@in=@local, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000003180)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003240), &(0x7f0000003280)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000032c0)={{{@in=@remote, @in6=@mcast1}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f00000033c0)=0xe8) getgroups(0x0, &(0x7f0000003400)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0x8) fstat(0xffffffffffffffff, &(0x7f0000003500)) getpgid(0xffffffffffffffff) getuid() getegid() getpgid(0x0) stat(&(0x7f0000003980)='./file0\x00', &(0x7f00000039c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a40), &(0x7f0000003a80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ac0), &(0x7f0000003b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b40)={{{@in=@remote, @in6=@local}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000003c40)=0xe8) getgroups(0x0, &(0x7f0000003c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003d40), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 03:33:40 executing program 0: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:40 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0xea) truncate(&(0x7f0000000040)='./bus\x00', 0x0) 03:33:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000040)={0x8, "907233dc30c1e1e0"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000000)="0f01c8b837000f00d867833800d9faba4100ec66b91208000066b80600000066ba000000000f30a7f26b23130f013d6d", 0x30}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000040)={0x8, "907233dc30c1e1e0"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000000)="0f01c8b837000f00d867833800d9faba4100ec66b91208000066b80600000066ba000000000f30a7f26b23130f013d6d", 0x30}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:40 executing program 4: add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000440), &(0x7f0000000700), 0x0, 0x0) pipe(&(0x7f0000000240)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f0000000640)=0x44) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000480)) creat(&(0x7f0000000080)='./file0\x00', 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:40 executing program 3: mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) dup2(0xffffffffffffff9c, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000880)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e40)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000f00)={'bcsh0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000fc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000), &(0x7f0000001040)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001080)={{{@in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000001180)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000012c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001300)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000001400)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000001500)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001840), 0x0, &(0x7f0000001880)=""/173, 0xad}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d00)={&(0x7f0000000840), 0xc, &(0x7f0000001cc0)={&(0x7f00000008c0)=ANY=[]}}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getresuid(&(0x7f0000000140), &(0x7f00000002c0), &(0x7f0000000300)) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0)=""/140, &(0x7f00000000c0)=0x8c) getegid() getresgid(&(0x7f0000000540), &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getegid() getgroups(0x0, &(0x7f0000000400)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) setregid(0x0, 0x0) pipe(&(0x7f0000000100)) vmsplice(0xffffffffffffffff, &(0x7f0000001780), 0x13a, 0x0) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), 0xc) memfd_create(&(0x7f0000000340)='\x00', 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000400)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) shutdown(0xffffffffffffffff, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211ab16064a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:40 executing program 2: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffe000/0x2000)=nil) getegid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0xfffffffffffffd7e, 0x0) msgget(0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000180)=""/18) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000340)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4), 0x2c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@loopback, @in6}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) setresuid(0x0, 0x0, 0x0) io_setup(0x0, &(0x7f0000000700)) io_submit(0x0, 0x0, &(0x7f0000000d40)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c80)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0be6969ef69dc00d96441fb0f1837370f38211a2e26f0011479c19086d9f28fc9410feefa4e2179fb010175450f2e1ac4010d64ac1e5d31a3b767e2989fc4e279795728") 03:33:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x42, &(0x7f0000dbb000), &(0x7f0000000000)=0xfffffffffffffef4) 03:33:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x42, &(0x7f0000dbb000), &(0x7f0000000000)=0xfffffffffffffef4) 03:33:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x42, &(0x7f0000dbb000), &(0x7f0000000000)=0xfffffffffffffef4) 03:33:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x42, &(0x7f0000dbb000), &(0x7f0000000000)=0xfffffffffffffef4) 03:33:41 executing program 0: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) getpgid(0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) ioctl$sock_SIOCSIFBR(r3, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000380)='irlan0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:41 executing program 1: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) getpgid(0xffffffffffffffff) ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000300)="1cd2805da06922692295d3200f01eece41ff0f183737c442a1a608c4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000100)) faccessat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) 03:33:41 executing program 4: add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000440), &(0x7f0000000700), 0x0, 0x0) pipe(&(0x7f0000000240)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f0000000640)=0x44) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000480)) creat(&(0x7f0000000080)='./file0\x00', 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:41 executing program 4: add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000440), &(0x7f0000000700), 0x0, 0x0) pipe(&(0x7f0000000240)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f0000000640)=0x44) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000480)) creat(&(0x7f0000000080)='./file0\x00', 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:41 executing program 3: mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) dup2(0xffffffffffffff9c, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000880)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e40)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000f00)={'bcsh0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000fc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000), &(0x7f0000001040)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001080)={{{@in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000001180)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000012c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001300)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000001400)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000001500)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001840), 0x0, &(0x7f0000001880)=""/173, 0xad}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d00)={&(0x7f0000000840), 0xc, &(0x7f0000001cc0)={&(0x7f00000008c0)=ANY=[]}}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getresuid(&(0x7f0000000140), &(0x7f00000002c0), &(0x7f0000000300)) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0)=""/140, &(0x7f00000000c0)=0x8c) getegid() getresgid(&(0x7f0000000540), &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getegid() getgroups(0x0, &(0x7f0000000400)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) setregid(0x0, 0x0) pipe(&(0x7f0000000100)) vmsplice(0xffffffffffffffff, &(0x7f0000001780), 0x13a, 0x0) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), 0xc) memfd_create(&(0x7f0000000340)='\x00', 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000400)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) shutdown(0xffffffffffffffff, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211ab16064a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:41 executing program 2: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffe000/0x2000)=nil) getegid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0xfffffffffffffd7e, 0x0) msgget(0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000180)=""/18) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000340)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4), 0x2c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@loopback, @in6}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) setresuid(0x0, 0x0, 0x0) io_setup(0x0, &(0x7f0000000700)) io_submit(0x0, 0x0, &(0x7f0000000d40)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c80)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0be6969ef69dc00d96441fb0f1837370f38211a2e26f0011479c19086d9f28fc9410feefa4e2179fb010175450f2e1ac4010d64ac1e5d31a3b767e2989fc4e279795728") 03:33:41 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f000000dff8)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:33:42 executing program 0: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:42 executing program 1: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) getpgid(0xffffffffffffffff) ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000300)="1cd2805da06922692295d3200f01eece41ff0f183737c442a1a608c4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000100)) faccessat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) 03:33:42 executing program 3: mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) dup2(0xffffffffffffff9c, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000880)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e40)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000f00)={'bcsh0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000fc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000), &(0x7f0000001040)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001080)={{{@in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000001180)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000012c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001300)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000001400)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000001500)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001840), 0x0, &(0x7f0000001880)=""/173, 0xad}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d00)={&(0x7f0000000840), 0xc, &(0x7f0000001cc0)={&(0x7f00000008c0)=ANY=[]}}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getresuid(&(0x7f0000000140), &(0x7f00000002c0), &(0x7f0000000300)) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0)=""/140, &(0x7f00000000c0)=0x8c) getegid() getresgid(&(0x7f0000000540), &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getegid() getgroups(0x0, &(0x7f0000000400)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) setregid(0x0, 0x0) pipe(&(0x7f0000000100)) vmsplice(0xffffffffffffffff, &(0x7f0000001780), 0x13a, 0x0) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), 0xc) memfd_create(&(0x7f0000000340)='\x00', 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000400)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) shutdown(0xffffffffffffffff, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211ab16064a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:42 executing program 4: add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000440), &(0x7f0000000700), 0x0, 0x0) pipe(&(0x7f0000000240)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f0000000640)=0x44) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000480)) creat(&(0x7f0000000080)='./file0\x00', 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:42 executing program 2: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffe000/0x2000)=nil) getegid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0xfffffffffffffd7e, 0x0) msgget(0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000180)=""/18) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000340)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4), 0x2c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@loopback, @in6}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) setresuid(0x0, 0x0, 0x0) io_setup(0x0, &(0x7f0000000700)) io_submit(0x0, 0x0, &(0x7f0000000d40)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c80)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0be6969ef69dc00d96441fb0f1837370f38211a2e26f0011479c19086d9f28fc9410feefa4e2179fb010175450f2e1ac4010d64ac1e5d31a3b767e2989fc4e279795728") 03:33:42 executing program 5: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000300)=""/9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) keyctl$read(0xb, 0x0, &(0x7f00000003c0)=""/44, 0x2c) getitimer(0x0, &(0x7f0000000140)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000480)) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000400)) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000340)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgid(0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) syz_open_procfs(0x0, &(0x7f00000001c0)='net/netfilter\x00') getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000240)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000440)) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:43 executing program 0: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:43 executing program 1: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) getpgid(0xffffffffffffffff) ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000300)="1cd2805da06922692295d3200f01eece41ff0f183737c442a1a608c4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000100)) faccessat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) 03:33:43 executing program 4: request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080), &(0x7f00000000c0)="656d31656d316e6f64657640656d31fd776c616e304000", 0xfffffffffffffffd) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000840)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000880)='$vboxnet1\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000280)="6977fbedcdfdd12b1550"}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000400)='rose0\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000740)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000780)='/dev/ppp\x00', 0xffffffffffffffff}, 0x30) getpgrp(0x0) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) getpgrp(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000980)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'irlan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000ac0)={'rose0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c80)={@ipv4={[], [], @loopback}}, &(0x7f0000000cc0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001b00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000033c0)={{{@in6=@loopback, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000034c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000035c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000036c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003700)={{{@in=@remote, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000006c40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000008280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000082c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000008400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008440)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000084c0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000e980), 0x0, 0x0, &(0x7f000000ec00)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ed80)={0x0, @loopback, @local}, &(0x7f000000edc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ee00)={{{@in6, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@loopback}}, &(0x7f000000ef00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ef40)={'dummy0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f000000ef80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000efc0)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000f000)={{{@in6=@mcast1}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@dev}}, &(0x7f000000f100)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f880)={&(0x7f0000000140), 0xc, &(0x7f000000f840)={&(0x7f0000000d00)=ANY=[]}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000001680)) lstat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)) getgid() signalfd(0xffffffffffffffff, &(0x7f00000017c0), 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in6=@local, @in6=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000001e40)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003800), &(0x7f0000003840)=0xc) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003940), &(0x7f0000003980)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:43 executing program 3: mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) dup2(0xffffffffffffff9c, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000880)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e40)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000f00)={'bcsh0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000fc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000), &(0x7f0000001040)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001080)={{{@in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000001180)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000012c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001300)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000001400)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000001500)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001840), 0x0, &(0x7f0000001880)=""/173, 0xad}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d00)={&(0x7f0000000840), 0xc, &(0x7f0000001cc0)={&(0x7f00000008c0)=ANY=[]}}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getresuid(&(0x7f0000000140), &(0x7f00000002c0), &(0x7f0000000300)) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0)=""/140, &(0x7f00000000c0)=0x8c) getegid() getresgid(&(0x7f0000000540), &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getegid() getgroups(0x0, &(0x7f0000000400)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) setregid(0x0, 0x0) pipe(&(0x7f0000000100)) vmsplice(0xffffffffffffffff, &(0x7f0000001780), 0x13a, 0x0) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), 0xc) memfd_create(&(0x7f0000000340)='\x00', 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000400)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) shutdown(0xffffffffffffffff, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211ab16064a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:43 executing program 2: ioprio_set$uid(0x2, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:43 executing program 5: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000300)=""/9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) keyctl$read(0xb, 0x0, &(0x7f00000003c0)=""/44, 0x2c) getitimer(0x0, &(0x7f0000000140)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000480)) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000400)) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000340)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgid(0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) syz_open_procfs(0x0, &(0x7f00000001c0)='net/netfilter\x00') getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000240)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000440)) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:44 executing program 0: clock_gettime(0x2, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000a40)) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000a80), 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) pipe2(&(0x7f0000000080), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0x12) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:44 executing program 1: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) getpgid(0xffffffffffffffff) ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000300)="1cd2805da06922692295d3200f01eece41ff0f183737c442a1a608c4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000100)) faccessat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) 03:33:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000840)=ANY=[], 0x0) 03:33:44 executing program 4: request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080), &(0x7f00000000c0)="656d31656d316e6f64657640656d31fd776c616e304000", 0xfffffffffffffffd) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000840)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000880)='$vboxnet1\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000280)="6977fbedcdfdd12b1550"}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000400)='rose0\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000740)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000780)='/dev/ppp\x00', 0xffffffffffffffff}, 0x30) getpgrp(0x0) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) getpgrp(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000980)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'irlan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000ac0)={'rose0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c80)={@ipv4={[], [], @loopback}}, &(0x7f0000000cc0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001b00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000033c0)={{{@in6=@loopback, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000034c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000035c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000036c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003700)={{{@in=@remote, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000006c40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000008280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000082c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000008400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008440)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000084c0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000e980), 0x0, 0x0, &(0x7f000000ec00)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ed80)={0x0, @loopback, @local}, &(0x7f000000edc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ee00)={{{@in6, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@loopback}}, &(0x7f000000ef00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ef40)={'dummy0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f000000ef80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000efc0)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000f000)={{{@in6=@mcast1}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@dev}}, &(0x7f000000f100)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f880)={&(0x7f0000000140), 0xc, &(0x7f000000f840)={&(0x7f0000000d00)=ANY=[]}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000001680)) lstat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)) getgid() signalfd(0xffffffffffffffff, &(0x7f00000017c0), 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in6=@local, @in6=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000001e40)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003800), &(0x7f0000003840)=0xc) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003940), &(0x7f0000003980)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:44 executing program 2: ioprio_set$uid(0x2, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:44 executing program 5: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000300)=""/9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) keyctl$read(0xb, 0x0, &(0x7f00000003c0)=""/44, 0x2c) getitimer(0x0, &(0x7f0000000140)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000480)) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000400)) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000340)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgid(0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) syz_open_procfs(0x0, &(0x7f00000001c0)='net/netfilter\x00') getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000240)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000440)) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:45 executing program 0: clock_gettime(0x2, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000a40)) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000a80), 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) pipe2(&(0x7f0000000080), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0x12) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:45 executing program 1: poll(&(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) sched_rr_get_interval(0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000140), &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f00000004c0)=""/4096}, 0x48) syz_open_dev$sndpcmp(&(0x7f0000001600)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000001640)) fstat(0xffffffffffffffff, &(0x7f0000000280)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000180)={0xffffffffffffff9c}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000014c0)=0xe8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000300), 0xc, &(0x7f0000001580)={&(0x7f0000001500)=@setlink={0x20}, 0x20}}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x0) 03:33:45 executing program 4: request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080), &(0x7f00000000c0)="656d31656d316e6f64657640656d31fd776c616e304000", 0xfffffffffffffffd) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000840)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000880)='$vboxnet1\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000280)="6977fbedcdfdd12b1550"}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000400)='rose0\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000740)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000780)='/dev/ppp\x00', 0xffffffffffffffff}, 0x30) getpgrp(0x0) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) getpgrp(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000980)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'irlan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000ac0)={'rose0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c80)={@ipv4={[], [], @loopback}}, &(0x7f0000000cc0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001b00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000033c0)={{{@in6=@loopback, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000034c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000035c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000036c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003700)={{{@in=@remote, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000006c40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000008280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000082c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000008400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008440)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000084c0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000e980), 0x0, 0x0, &(0x7f000000ec00)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ed80)={0x0, @loopback, @local}, &(0x7f000000edc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ee00)={{{@in6, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@loopback}}, &(0x7f000000ef00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ef40)={'dummy0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f000000ef80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000efc0)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000f000)={{{@in6=@mcast1}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@dev}}, &(0x7f000000f100)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f880)={&(0x7f0000000140), 0xc, &(0x7f000000f840)={&(0x7f0000000d00)=ANY=[]}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000001680)) lstat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)) getgid() signalfd(0xffffffffffffffff, &(0x7f00000017c0), 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in6=@local, @in6=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000001e40)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003800), &(0x7f0000003840)=0xc) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003940), &(0x7f0000003980)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000840)=ANY=[], 0x0) 03:33:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000840)=ANY=[], 0x0) 03:33:45 executing program 2: ioprio_set$uid(0x2, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:45 executing program 5: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000300)=""/9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) keyctl$read(0xb, 0x0, &(0x7f00000003c0)=""/44, 0x2c) getitimer(0x0, &(0x7f0000000140)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000480)) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000400)) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000340)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgid(0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) syz_open_procfs(0x0, &(0x7f00000001c0)='net/netfilter\x00') getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000240)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000440)) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:45 executing program 0: clock_gettime(0x2, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000a40)) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000a80), 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) pipe2(&(0x7f0000000080), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0x12) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:46 executing program 4: request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080), &(0x7f00000000c0)="656d31656d316e6f64657640656d31fd776c616e304000", 0xfffffffffffffffd) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000840)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000880)='$vboxnet1\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000280)="6977fbedcdfdd12b1550"}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000400)='rose0\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000740)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000780)='/dev/ppp\x00', 0xffffffffffffffff}, 0x30) getpgrp(0x0) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) getpgrp(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000980)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'irlan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000ac0)={'rose0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c80)={@ipv4={[], [], @loopback}}, &(0x7f0000000cc0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001b00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000033c0)={{{@in6=@loopback, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000034c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000035c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000036c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003700)={{{@in=@remote, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000006c40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000008280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000082c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000008400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008440)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000084c0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000e980), 0x0, 0x0, &(0x7f000000ec00)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ed80)={0x0, @loopback, @local}, &(0x7f000000edc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ee00)={{{@in6, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@loopback}}, &(0x7f000000ef00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ef40)={'dummy0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f000000ef80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000efc0)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000f000)={{{@in6=@mcast1}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@dev}}, &(0x7f000000f100)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f880)={&(0x7f0000000140), 0xc, &(0x7f000000f840)={&(0x7f0000000d00)=ANY=[]}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000001680)) lstat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)) getgid() signalfd(0xffffffffffffffff, &(0x7f00000017c0), 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in6=@local, @in6=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000001e40)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003800), &(0x7f0000003840)=0xc) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003940), &(0x7f0000003980)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:46 executing program 1: poll(&(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) sched_rr_get_interval(0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000140), &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f00000004c0)=""/4096}, 0x48) syz_open_dev$sndpcmp(&(0x7f0000001600)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000001640)) fstat(0xffffffffffffffff, &(0x7f0000000280)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000180)={0xffffffffffffff9c}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000014c0)=0xe8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000300), 0xc, &(0x7f0000001580)={&(0x7f0000001500)=@setlink={0x20}, 0x20}}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x0) 03:33:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000840)=ANY=[], 0x0) 03:33:46 executing program 2: ioprio_set$uid(0x2, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f00000008c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@multicast1, @in6=@mcast2}}, {{@in=@multicast2}}}, &(0x7f0000000400)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'yam0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in=@loopback, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000a00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000a40), &(0x7f0000000a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000c40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000d00)={@ipv4={[], [], @multicast2}}, &(0x7f0000000d40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e40)={'nr0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000ec0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f00)={0x0, @multicast2, @multicast2}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000012c0)=0xff4d) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001300)={{{@in=@dev}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001540)=0x251, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001e80)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f00)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002000)={{{@in=@dev, @in6=@local}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000002100)=0xe8) accept(0xffffffffffffffff, &(0x7f0000002140)=@xdp, &(0x7f00000021c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002240)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002400)={@mcast2}, &(0x7f0000002440)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f0000000340), 0xc, &(0x7f0000002b00)={&(0x7f0000000d80)=ANY=[]}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpid() getpgid(0xffffffffffffffff) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000540)=0xc) gettid() getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000580)) syz_execute_func(&(0x7f00000003c0)="425955a06b6969ef69dc00d9f1a890a8903737c30f38211a6440def264a72e66460f7f22400f01efe5e57d0f2e1a1ac4017b10430001ee31a3b786e2989f3f") 03:33:46 executing program 0: clock_gettime(0x2, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000a40)) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000a80), 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) pipe2(&(0x7f0000000080), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0x12) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f00000008c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@multicast1, @in6=@mcast2}}, {{@in=@multicast2}}}, &(0x7f0000000400)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'yam0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in=@loopback, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000a00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000a40), &(0x7f0000000a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000c40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000d00)={@ipv4={[], [], @multicast2}}, &(0x7f0000000d40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e40)={'nr0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000ec0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f00)={0x0, @multicast2, @multicast2}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000012c0)=0xff4d) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001300)={{{@in=@dev}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001540)=0x251, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001e80)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f00)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002000)={{{@in=@dev, @in6=@local}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000002100)=0xe8) accept(0xffffffffffffffff, &(0x7f0000002140)=@xdp, &(0x7f00000021c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002240)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002400)={@mcast2}, &(0x7f0000002440)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f0000000340), 0xc, &(0x7f0000002b00)={&(0x7f0000000d80)=ANY=[]}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpid() getpgid(0xffffffffffffffff) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000540)=0xc) gettid() getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000580)) syz_execute_func(&(0x7f00000003c0)="425955a06b6969ef69dc00d9f1a890a8903737c30f38211a6440def264a72e66460f7f22400f01efe5e57d0f2e1a1ac4017b10430001ee31a3b786e2989f3f") 03:33:47 executing program 1: poll(&(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) sched_rr_get_interval(0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000140), &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f00000004c0)=""/4096}, 0x48) syz_open_dev$sndpcmp(&(0x7f0000001600)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000001640)) fstat(0xffffffffffffffff, &(0x7f0000000280)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000180)={0xffffffffffffff9c}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000014c0)=0xe8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000300), 0xc, &(0x7f0000001580)={&(0x7f0000001500)=@setlink={0x20}, 0x20}}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x0) 03:33:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f00000008c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@multicast1, @in6=@mcast2}}, {{@in=@multicast2}}}, &(0x7f0000000400)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'yam0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in=@loopback, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000a00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000a40), &(0x7f0000000a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000c40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000d00)={@ipv4={[], [], @multicast2}}, &(0x7f0000000d40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e40)={'nr0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000ec0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f00)={0x0, @multicast2, @multicast2}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000012c0)=0xff4d) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001300)={{{@in=@dev}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001540)=0x251, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001e80)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f00)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002000)={{{@in=@dev, @in6=@local}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000002100)=0xe8) accept(0xffffffffffffffff, &(0x7f0000002140)=@xdp, &(0x7f00000021c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002240)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002400)={@mcast2}, &(0x7f0000002440)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f0000000340), 0xc, &(0x7f0000002b00)={&(0x7f0000000d80)=ANY=[]}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpid() getpgid(0xffffffffffffffff) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000540)=0xc) gettid() getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000580)) syz_execute_func(&(0x7f00000003c0)="425955a06b6969ef69dc00d9f1a890a8903737c30f38211a6440def264a72e66460f7f22400f01efe5e57d0f2e1a1ac4017b10430001ee31a3b786e2989f3f") 03:33:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="390000001300094700bb61e1c3e4ffff06000000020000004500000020000000190029000d0000000000280f00000007fd17e9ffff06060400", 0x39}], 0x1) [ 1216.506056] netlink: 'syz-executor4': attribute type 41 has an invalid length. 03:33:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="390000001300094700bb61e1c3e4ffff06000000020000004500000020000000190029000d0000000000280f00000007fd17e9ffff06060400", 0x39}], 0x1) 03:33:47 executing program 3: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) eventfd2(0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast2}}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@local, @in=@broadcast}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000a40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@local, @in=@remote}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) getgid() stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00'}, 0x13b04f2c9fa2ebd) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)='syz1\x00') syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 1216.688648] netlink: 'syz-executor4': attribute type 41 has an invalid length. 03:33:47 executing program 2: mmap(&(0x7f0000074000/0xf000)=nil, 0xf000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000240), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680)) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_vs\x00') ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000300)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000280)={0x14}, 0x14) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getpeername(0xffffffffffffffff, &(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x80) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x9) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in, @in6=@dev}}, {{@in6=@dev}}}, &(0x7f00000005c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000012c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001300)={{{@in=@broadcast, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000001400)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @local, @loopback}, &(0x7f0000001640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001840)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001900)={@local, @multicast1}, &(0x7f0000001940)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001ac0)={'teql0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b80)={0x0, @broadcast, @remote}, &(0x7f0000001bc0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001c00)={@loopback, @multicast2}, &(0x7f0000001c40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001cc0)=0x1f07ce351438e49e) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001e40)=@xdp, &(0x7f0000001ec0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001f40)=0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f00000008c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@multicast1, @in6=@mcast2}}, {{@in=@multicast2}}}, &(0x7f0000000400)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'yam0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in=@loopback, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000a00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000a40), &(0x7f0000000a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000c40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000d00)={@ipv4={[], [], @multicast2}}, &(0x7f0000000d40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e40)={'nr0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000ec0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f00)={0x0, @multicast2, @multicast2}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000012c0)=0xff4d) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001300)={{{@in=@dev}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001540)=0x251, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001e80)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f00)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002000)={{{@in=@dev, @in6=@local}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000002100)=0xe8) accept(0xffffffffffffffff, &(0x7f0000002140)=@xdp, &(0x7f00000021c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002240)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002400)={@mcast2}, &(0x7f0000002440)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f0000000340), 0xc, &(0x7f0000002b00)={&(0x7f0000000d80)=ANY=[]}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpid() getpgid(0xffffffffffffffff) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000540)=0xc) gettid() getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000580)) syz_execute_func(&(0x7f00000003c0)="425955a06b6969ef69dc00d9f1a890a8903737c30f38211a6440def264a72e66460f7f22400f01efe5e57d0f2e1a1ac4017b10430001ee31a3b786e2989f3f") 03:33:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="390000001300094700bb61e1c3e4ffff06000000020000004500000020000000190029000d0000000000280f00000007fd17e9ffff06060400", 0x39}], 0x1) 03:33:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="390000001300094700bb61e1c3e4ffff06000000020000004500000020000000190029000d0000000000280f00000007fd17e9ffff06060400", 0x39}], 0x1) [ 1216.909125] netlink: 'syz-executor4': attribute type 41 has an invalid length. [ 1217.014893] netlink: 'syz-executor4': attribute type 41 has an invalid length. 03:33:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)) 03:33:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8000000004) recvmmsg(r0, &(0x7f0000006900)=[{{0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000800)=""/249, 0x4ac}}], 0x1, 0x0, &(0x7f0000006b00)) r1 = socket$inet6(0xa, 0x801, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="15446234488dd25d766070") sendmsg$nl_netfilter(r0, &(0x7f0000002ac0)={&(0x7f0000000540), 0xc, &(0x7f00000007c0)={&(0x7f0000002b00)=ANY=[]}}, 0x0) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 03:33:47 executing program 5: getpgid(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='/proc/self/net/pfkey\x00'}, 0xfffffffffffffda8) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240), &(0x7f00000003c0)=0xffffffe7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc3) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:48 executing program 1: poll(&(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) sched_rr_get_interval(0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000140), &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f00000004c0)=""/4096}, 0x48) syz_open_dev$sndpcmp(&(0x7f0000001600)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000001640)) fstat(0xffffffffffffffff, &(0x7f0000000280)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000180)={0xffffffffffffff9c}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000014c0)=0xe8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000300), 0xc, &(0x7f0000001580)={&(0x7f0000001500)=@setlink={0x20}, 0x20}}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x0) 03:33:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8000000004) recvmmsg(r0, &(0x7f0000006900)=[{{0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000800)=""/249, 0x4ac}}], 0x1, 0x0, &(0x7f0000006b00)) r1 = socket$inet6(0xa, 0x801, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="15446234488dd25d766070") sendmsg$nl_netfilter(r0, &(0x7f0000002ac0)={&(0x7f0000000540), 0xc, &(0x7f00000007c0)={&(0x7f0000002b00)=ANY=[]}}, 0x0) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 03:33:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)) 03:33:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)) 03:33:48 executing program 3: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) eventfd2(0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast2}}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@local, @in=@broadcast}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000a40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@local, @in=@remote}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) getgid() stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00'}, 0x13b04f2c9fa2ebd) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)='syz1\x00') syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:33:48 executing program 2: mmap(&(0x7f0000074000/0xf000)=nil, 0xf000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000240), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680)) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_vs\x00') ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000300)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000280)={0x14}, 0x14) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getpeername(0xffffffffffffffff, &(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x80) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x9) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in, @in6=@dev}}, {{@in6=@dev}}}, &(0x7f00000005c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000012c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001300)={{{@in=@broadcast, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000001400)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @local, @loopback}, &(0x7f0000001640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001840)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001900)={@local, @multicast1}, &(0x7f0000001940)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001ac0)={'teql0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b80)={0x0, @broadcast, @remote}, &(0x7f0000001bc0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001c00)={@loopback, @multicast2}, &(0x7f0000001c40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001cc0)=0x1f07ce351438e49e) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001e40)=@xdp, &(0x7f0000001ec0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001f40)=0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8000000004) recvmmsg(r0, &(0x7f0000006900)=[{{0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000800)=""/249, 0x4ac}}], 0x1, 0x0, &(0x7f0000006b00)) r1 = socket$inet6(0xa, 0x801, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="15446234488dd25d766070") sendmsg$nl_netfilter(r0, &(0x7f0000002ac0)={&(0x7f0000000540), 0xc, &(0x7f00000007c0)={&(0x7f0000002b00)=ANY=[]}}, 0x0) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 03:33:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)) 03:33:48 executing program 3: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) eventfd2(0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast2}}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@local, @in=@broadcast}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000a40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@local, @in=@remote}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) getgid() stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00'}, 0x13b04f2c9fa2ebd) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)='syz1\x00') syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:33:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8000000004) recvmmsg(r0, &(0x7f0000006900)=[{{0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000800)=""/249, 0x4ac}}], 0x1, 0x0, &(0x7f0000006b00)) r1 = socket$inet6(0xa, 0x801, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="15446234488dd25d766070") sendmsg$nl_netfilter(r0, &(0x7f0000002ac0)={&(0x7f0000000540), 0xc, &(0x7f00000007c0)={&(0x7f0000002b00)=ANY=[]}}, 0x0) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 03:33:48 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff88, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x7}}}}}}, &(0x7f0000000040)) 03:33:48 executing program 5: getpgid(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='/proc/self/net/pfkey\x00'}, 0xfffffffffffffda8) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240), &(0x7f00000003c0)=0xffffffe7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc3) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:48 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff88, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x7}}}}}}, &(0x7f0000000040)) 03:33:48 executing program 4: mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/57) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') getgroups(0x0, &(0x7f0000000200)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f0000000740)=0xc) getresgid(&(0x7f0000000780), &(0x7f0000000840), &(0x7f0000000880)) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgroups(0x0, &(0x7f0000000ac0)) getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) getgroups(0x0, &(0x7f0000000bc0)) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") fstat(0xffffffffffffffff, &(0x7f00000007c0)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000004c0)) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000600)}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000600), &(0x7f0000000640)=0x14) syz_extract_tcp_res$synack(&(0x7f0000000700), 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000006c0), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@loopback}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f00000009c0)=0xe8) 03:33:48 executing program 1: syz_emit_ethernet(0xe, &(0x7f0000000300)={@remote, @local, [], {@mpls_mc}}, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da06d0fef69dc0f01eeaf6c66410f6840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0xffffffffffffff1a, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) capget(&(0x7f0000000540), &(0x7f00000007c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000440)={0x14}, 0x14) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000000a40)) getgroups(0x0, &(0x7f00000005c0)) getegid() lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000bc0)=ANY=[], 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0xffffffffffffffbc) 03:33:49 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff88, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x7}}}}}}, &(0x7f0000000040)) 03:33:49 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff88, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x7}}}}}}, &(0x7f0000000040)) 03:33:49 executing program 2: mmap(&(0x7f0000074000/0xf000)=nil, 0xf000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000240), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680)) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_vs\x00') ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000300)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000280)={0x14}, 0x14) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getpeername(0xffffffffffffffff, &(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x80) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x9) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in, @in6=@dev}}, {{@in6=@dev}}}, &(0x7f00000005c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000012c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001300)={{{@in=@broadcast, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000001400)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @local, @loopback}, &(0x7f0000001640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001840)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001900)={@local, @multicast1}, &(0x7f0000001940)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001ac0)={'teql0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b80)={0x0, @broadcast, @remote}, &(0x7f0000001bc0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001c00)={@loopback, @multicast2}, &(0x7f0000001c40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001cc0)=0x1f07ce351438e49e) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001e40)=@xdp, &(0x7f0000001ec0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001f40)=0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:49 executing program 4: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe2(&(0x7f00000004c0), 0x0) socket$rds(0x15, 0x5, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240)='tunl0\x00', 0x10) syz_execute_func(&(0x7f0000000680)="42805da0b60fef69dc0f01eec462b105878962b53073fe8c78110f110f420f76f3f242d2be00000000c481b5e5bc2b00000021def46b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe26607d0bc50000000200703") 03:33:49 executing program 0: munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000580)=0xfffffffffffffe8a) getresgid(&(0x7f0000000540), &(0x7f0000000300), &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/12, 0xc, 0x0, &(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10) pipe(&(0x7f0000000140)) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000400)) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000080)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000440)) getgroups(0x0, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) dup(0xffffffffffffffff) getpgid(0xffffffffffffffff) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)=ANY=[], 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000004c0)) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") connect$packet(0xffffffffffffffff, &(0x7f0000000500), 0x14) utimes(&(0x7f0000000200)='./file0\x00', &(0x7f0000000480)={{0x77359400}, {0x0, 0x7530}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f00000000c0)='trusted.overlay.upper\x00', 0xffffffffffffffff}, 0x30) 03:33:49 executing program 3: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) eventfd2(0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast2}}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@local, @in=@broadcast}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000a40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@local, @in=@remote}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) getgid() stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00'}, 0x13b04f2c9fa2ebd) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)='syz1\x00') syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:33:49 executing program 5: getpgid(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='/proc/self/net/pfkey\x00'}, 0xfffffffffffffda8) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240), &(0x7f00000003c0)=0xffffffe7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc3) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:49 executing program 1: syz_emit_ethernet(0xe, &(0x7f0000000300)={@remote, @local, [], {@mpls_mc}}, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da06d0fef69dc0f01eeaf6c66410f6840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0xffffffffffffff1a, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) capget(&(0x7f0000000540), &(0x7f00000007c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000440)={0x14}, 0x14) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000000a40)) getgroups(0x0, &(0x7f00000005c0)) getegid() lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000bc0)=ANY=[], 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0xffffffffffffffbc) 03:33:50 executing program 4: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe2(&(0x7f00000004c0), 0x0) socket$rds(0x15, 0x5, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240)='tunl0\x00', 0x10) syz_execute_func(&(0x7f0000000680)="42805da0b60fef69dc0f01eec462b105878962b53073fe8c78110f110f420f76f3f242d2be00000000c481b5e5bc2b00000021def46b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe26607d0bc50000000200703") 03:33:50 executing program 2: mmap(&(0x7f0000074000/0xf000)=nil, 0xf000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000240), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680)) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_vs\x00') ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000300)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000280)={0x14}, 0x14) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getpeername(0xffffffffffffffff, &(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x80) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x9) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in, @in6=@dev}}, {{@in6=@dev}}}, &(0x7f00000005c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000012c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001300)={{{@in=@broadcast, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000001400)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @local, @loopback}, &(0x7f0000001640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001840)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001900)={@local, @multicast1}, &(0x7f0000001940)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001ac0)={'teql0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b80)={0x0, @broadcast, @remote}, &(0x7f0000001bc0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001c00)={@loopback, @multicast2}, &(0x7f0000001c40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001cc0)=0x1f07ce351438e49e) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001e40)=@xdp, &(0x7f0000001ec0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001f40)=0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:50 executing program 3: keyctl$set_reqkey_keyring(0x6, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe2$9p(&(0x7f00000003c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:50 executing program 5: getpgid(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='/proc/self/net/pfkey\x00'}, 0xfffffffffffffda8) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240), &(0x7f00000003c0)=0xffffffe7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc3) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:50 executing program 0: syz_open_dev$mouse(&(0x7f0000000580)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x8000040000001) write$evdev(r0, &(0x7f00008c1fd0)=[{}, {{}, 0x0, 0x2}], 0x32a) 03:33:50 executing program 1: syz_emit_ethernet(0xe, &(0x7f0000000300)={@remote, @local, [], {@mpls_mc}}, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da06d0fef69dc0f01eeaf6c66410f6840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0xffffffffffffff1a, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) capget(&(0x7f0000000540), &(0x7f00000007c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000440)={0x14}, 0x14) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000000a40)) getgroups(0x0, &(0x7f00000005c0)) getegid() lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000bc0)=ANY=[], 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0xffffffffffffffbc) 03:33:51 executing program 0: syz_open_dev$mouse(&(0x7f0000000580)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x8000040000001) write$evdev(r0, &(0x7f00008c1fd0)=[{}, {{}, 0x0, 0x2}], 0x32a) 03:33:51 executing program 4: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe2(&(0x7f00000004c0), 0x0) socket$rds(0x15, 0x5, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240)='tunl0\x00', 0x10) syz_execute_func(&(0x7f0000000680)="42805da0b60fef69dc0f01eec462b105878962b53073fe8c78110f110f420f76f3f242d2be00000000c481b5e5bc2b00000021def46b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe26607d0bc50000000200703") 03:33:51 executing program 2: clock_gettime(0x9, &(0x7f0000000200)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vcs\x00', 0x0, 0x0) getegid() poll(&(0x7f0000000300), 0x0, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240), &(0x7f0000000280)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000080)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f00000000c0)=0x28) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000400), &(0x7f0000000640)=0x4) socket$kcm(0x29, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440), 0xc, &(0x7f0000000880), 0x0, &(0x7f0000000d80)}, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000f00)={"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"}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000040)) write$tun(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000340)) readv(0xffffffffffffffff, &(0x7f0000000a80), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') 03:33:51 executing program 3: keyctl$set_reqkey_keyring(0x6, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe2$9p(&(0x7f00000003c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:51 executing program 0: syz_open_dev$mouse(&(0x7f0000000580)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x8000040000001) write$evdev(r0, &(0x7f00008c1fd0)=[{}, {{}, 0x0, 0x2}], 0x32a) 03:33:51 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) gettid() getpgrp(0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000028c0)='/dev/rtc0\x00', 0x0, 0x0) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002cc0)={{{@in=@multicast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000002dc0)=0xe8) lstat(0xffffffffffffffff, &(0x7f0000000200)) getresuid(&(0x7f0000002e80), &(0x7f0000002ec0), &(0x7f0000002f00)) getresgid(&(0x7f0000002f40), &(0x7f0000002f80), &(0x7f0000002fc0)) fstat(0xffffffffffffffff, &(0x7f0000003000)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000044c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000045c0)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004600)={{{@in6=@remote, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000004700)=0xe8) lstat(&(0x7f0000004740)='./file0\x00', &(0x7f0000004780)) getuid() getgroups(0x0, &(0x7f0000000080)) getuid() getgid() getuid() lstat(&(0x7f0000005d80)='./file0\x00', &(0x7f0000005dc0)) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005f80)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000006080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000280)) stat(&(0x7f0000007780)='./file0\x00', &(0x7f00000077c0)) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007840)={{{@in6, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000007940)=0xe8) getegid() getresuid(&(0x7f0000007980), &(0x7f00000079c0), &(0x7f0000007a00)) lstat(&(0x7f0000007a40)='./file0\x00', &(0x7f0000007a80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000029c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:33:51 executing program 0: syz_open_dev$mouse(&(0x7f0000000580)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x8000040000001) write$evdev(r0, &(0x7f00008c1fd0)=[{}, {{}, 0x0, 0x2}], 0x32a) 03:33:51 executing program 1: syz_emit_ethernet(0xe, &(0x7f0000000300)={@remote, @local, [], {@mpls_mc}}, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da06d0fef69dc0f01eeaf6c66410f6840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0xffffffffffffff1a, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) capget(&(0x7f0000000540), &(0x7f00000007c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000440)={0x14}, 0x14) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000000a40)) getgroups(0x0, &(0x7f00000005c0)) getegid() lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000bc0)=ANY=[], 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0xffffffffffffffbc) 03:33:51 executing program 0: memfd_create(&(0x7f00000000c0)='\x00', 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:52 executing program 4: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe2(&(0x7f00000004c0), 0x0) socket$rds(0x15, 0x5, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240)='tunl0\x00', 0x10) syz_execute_func(&(0x7f0000000680)="42805da0b60fef69dc0f01eec462b105878962b53073fe8c78110f110f420f76f3f242d2be00000000c481b5e5bc2b00000021def46b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe26607d0bc50000000200703") 03:33:52 executing program 2: clock_gettime(0x9, &(0x7f0000000200)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vcs\x00', 0x0, 0x0) getegid() poll(&(0x7f0000000300), 0x0, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240), &(0x7f0000000280)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000080)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f00000000c0)=0x28) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000400), &(0x7f0000000640)=0x4) socket$kcm(0x29, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440), 0xc, &(0x7f0000000880), 0x0, &(0x7f0000000d80)}, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000f00)={"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"}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000040)) write$tun(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000340)) readv(0xffffffffffffffff, &(0x7f0000000a80), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') 03:33:52 executing program 3: keyctl$set_reqkey_keyring(0x6, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe2$9p(&(0x7f00000003c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:52 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) gettid() getpgrp(0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000028c0)='/dev/rtc0\x00', 0x0, 0x0) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002cc0)={{{@in=@multicast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000002dc0)=0xe8) lstat(0xffffffffffffffff, &(0x7f0000000200)) getresuid(&(0x7f0000002e80), &(0x7f0000002ec0), &(0x7f0000002f00)) getresgid(&(0x7f0000002f40), &(0x7f0000002f80), &(0x7f0000002fc0)) fstat(0xffffffffffffffff, &(0x7f0000003000)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000044c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000045c0)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004600)={{{@in6=@remote, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000004700)=0xe8) lstat(&(0x7f0000004740)='./file0\x00', &(0x7f0000004780)) getuid() getgroups(0x0, &(0x7f0000000080)) getuid() getgid() getuid() lstat(&(0x7f0000005d80)='./file0\x00', &(0x7f0000005dc0)) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005f80)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000006080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000280)) stat(&(0x7f0000007780)='./file0\x00', &(0x7f00000077c0)) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007840)={{{@in6, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000007940)=0xe8) getegid() getresuid(&(0x7f0000007980), &(0x7f00000079c0), &(0x7f0000007a00)) lstat(&(0x7f0000007a40)='./file0\x00', &(0x7f0000007a80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000029c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:33:52 executing program 1: timer_getoverrun(0x0) seccomp(0x0, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000180)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000340)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)}}, 0x20) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xd769971005d80416) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000980), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/209, 0xd1, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000880)=""/228) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000740)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000680)}) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}}}, 0x48) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000005c0)) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') syz_execute_func(&(0x7f0000000340)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300fc4c14571f5961a40a5c07f41df0f01efe5e5ecd1a2a21a01460f01ee45dfde644380ed97") 03:33:52 executing program 1: timer_getoverrun(0x0) seccomp(0x0, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000180)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000340)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)}}, 0x20) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xd769971005d80416) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000980), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/209, 0xd1, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000880)=""/228) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000740)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000680)}) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}}}, 0x48) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000005c0)) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') syz_execute_func(&(0x7f0000000340)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300fc4c14571f5961a40a5c07f41df0f01efe5e5ecd1a2a21a01460f01ee45dfde644380ed97") 03:33:52 executing program 0: memfd_create(&(0x7f00000000c0)='\x00', 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:53 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000880)=0xe8) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f00000000c0)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000700), 0xc, &(0x7f0000000b00)={&(0x7f0000000200)=@delpolicy={0x50, 0x14, 0x0, 0x0, 0x0, {{@in=@multicast1, @in=@remote}}}, 0x50}}, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) getpeername(0xffffffffffffffff, &(0x7f00000003c0)=@l2, &(0x7f0000000440)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000040)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:53 executing program 1: timer_getoverrun(0x0) seccomp(0x0, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000180)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000340)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)}}, 0x20) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xd769971005d80416) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000980), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/209, 0xd1, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000880)=""/228) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000740)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000680)}) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}}}, 0x48) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000005c0)) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') syz_execute_func(&(0x7f0000000340)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300fc4c14571f5961a40a5c07f41df0f01efe5e5ecd1a2a21a01460f01ee45dfde644380ed97") 03:33:53 executing program 2: clock_gettime(0x9, &(0x7f0000000200)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vcs\x00', 0x0, 0x0) getegid() poll(&(0x7f0000000300), 0x0, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240), &(0x7f0000000280)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000080)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f00000000c0)=0x28) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000400), &(0x7f0000000640)=0x4) socket$kcm(0x29, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440), 0xc, &(0x7f0000000880), 0x0, &(0x7f0000000d80)}, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000f00)={"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"}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000040)) write$tun(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000340)) readv(0xffffffffffffffff, &(0x7f0000000a80), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') 03:33:53 executing program 3: keyctl$set_reqkey_keyring(0x6, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe2$9p(&(0x7f00000003c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:53 executing program 1: timer_getoverrun(0x0) seccomp(0x0, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000180)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000340)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)}}, 0x20) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xd769971005d80416) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000980), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/209, 0xd1, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000880)=""/228) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000740)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000680)}) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}}}, 0x48) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000005c0)) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') syz_execute_func(&(0x7f0000000340)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300fc4c14571f5961a40a5c07f41df0f01efe5e5ecd1a2a21a01460f01ee45dfde644380ed97") 03:33:53 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) gettid() getpgrp(0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000028c0)='/dev/rtc0\x00', 0x0, 0x0) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002cc0)={{{@in=@multicast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000002dc0)=0xe8) lstat(0xffffffffffffffff, &(0x7f0000000200)) getresuid(&(0x7f0000002e80), &(0x7f0000002ec0), &(0x7f0000002f00)) getresgid(&(0x7f0000002f40), &(0x7f0000002f80), &(0x7f0000002fc0)) fstat(0xffffffffffffffff, &(0x7f0000003000)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000044c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000045c0)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004600)={{{@in6=@remote, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000004700)=0xe8) lstat(&(0x7f0000004740)='./file0\x00', &(0x7f0000004780)) getuid() getgroups(0x0, &(0x7f0000000080)) getuid() getgid() getuid() lstat(&(0x7f0000005d80)='./file0\x00', &(0x7f0000005dc0)) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005f80)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000006080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000280)) stat(&(0x7f0000007780)='./file0\x00', &(0x7f00000077c0)) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007840)={{{@in6, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000007940)=0xe8) getegid() getresuid(&(0x7f0000007980), &(0x7f00000079c0), &(0x7f0000007a00)) lstat(&(0x7f0000007a40)='./file0\x00', &(0x7f0000007a80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000029c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:33:53 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x400000000000000, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = epoll_create(0xe29f) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000240)) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r4, 0x8912, &(0x7f0000000100)="153f6234488dd25d766070") read(r0, &(0x7f00000001c0)=""/109, 0x6d) ppoll(&(0x7f0000000140)=[{r3}, {r1}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x8) close(r2) 03:33:53 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x400000000000000, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = epoll_create(0xe29f) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000240)) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r4, 0x8912, &(0x7f0000000100)="153f6234488dd25d766070") read(r0, &(0x7f00000001c0)=""/109, 0x6d) ppoll(&(0x7f0000000140)=[{r3}, {r1}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x8) close(r2) 03:33:53 executing program 0: memfd_create(&(0x7f00000000c0)='\x00', 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:53 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000880)=0xe8) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f00000000c0)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000700), 0xc, &(0x7f0000000b00)={&(0x7f0000000200)=@delpolicy={0x50, 0x14, 0x0, 0x0, 0x0, {{@in=@multicast1, @in=@remote}}}, 0x50}}, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) getpeername(0xffffffffffffffff, &(0x7f00000003c0)=@l2, &(0x7f0000000440)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000040)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:54 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x400000000000000, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = epoll_create(0xe29f) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000240)) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r4, 0x8912, &(0x7f0000000100)="153f6234488dd25d766070") read(r0, &(0x7f00000001c0)=""/109, 0x6d) ppoll(&(0x7f0000000140)=[{r3}, {r1}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x8) close(r2) 03:33:54 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x400000000000000, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = epoll_create(0xe29f) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000240)) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r4, 0x8912, &(0x7f0000000100)="153f6234488dd25d766070") read(r0, &(0x7f00000001c0)=""/109, 0x6d) ppoll(&(0x7f0000000140)=[{r3}, {r1}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x8) close(r2) 03:33:54 executing program 2: clock_gettime(0x9, &(0x7f0000000200)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vcs\x00', 0x0, 0x0) getegid() poll(&(0x7f0000000300), 0x0, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240), &(0x7f0000000280)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000080)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f00000000c0)=0x28) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000400), &(0x7f0000000640)=0x4) socket$kcm(0x29, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440), 0xc, &(0x7f0000000880), 0x0, &(0x7f0000000d80)}, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000f00)={"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"}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000040)) write$tun(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000340)) readv(0xffffffffffffffff, &(0x7f0000000a80), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') 03:33:54 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x400000000000000, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = epoll_create(0xe29f) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000240)) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r4, 0x8912, &(0x7f0000000100)="153f6234488dd25d766070") read(r0, &(0x7f00000001c0)=""/109, 0x6d) ppoll(&(0x7f0000000140)=[{r3}, {r1}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x8) close(r2) 03:33:54 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) gettid() getpgrp(0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000028c0)='/dev/rtc0\x00', 0x0, 0x0) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002cc0)={{{@in=@multicast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000002dc0)=0xe8) lstat(0xffffffffffffffff, &(0x7f0000000200)) getresuid(&(0x7f0000002e80), &(0x7f0000002ec0), &(0x7f0000002f00)) getresgid(&(0x7f0000002f40), &(0x7f0000002f80), &(0x7f0000002fc0)) fstat(0xffffffffffffffff, &(0x7f0000003000)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000044c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000045c0)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004600)={{{@in6=@remote, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000004700)=0xe8) lstat(&(0x7f0000004740)='./file0\x00', &(0x7f0000004780)) getuid() getgroups(0x0, &(0x7f0000000080)) getuid() getgid() getuid() lstat(&(0x7f0000005d80)='./file0\x00', &(0x7f0000005dc0)) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005f80)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000006080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000280)) stat(&(0x7f0000007780)='./file0\x00', &(0x7f00000077c0)) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007840)={{{@in6, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000007940)=0xe8) getegid() getresuid(&(0x7f0000007980), &(0x7f00000079c0), &(0x7f0000007a00)) lstat(&(0x7f0000007a40)='./file0\x00', &(0x7f0000007a80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000029c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:33:54 executing program 0: memfd_create(&(0x7f00000000c0)='\x00', 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:54 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x400000000000000, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = epoll_create(0xe29f) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000240)) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r4, 0x8912, &(0x7f0000000100)="153f6234488dd25d766070") read(r0, &(0x7f00000001c0)=""/109, 0x6d) ppoll(&(0x7f0000000140)=[{r3}, {r1}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x8) close(r2) 03:33:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000020107041dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e28000000110affffba16a0aa1c0009b356da5a80d18bec4c8546c824392986ad06b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 03:33:55 executing program 2: getrusage(0x0, &(0x7f0000000180)) keyctl$set_reqkey_keyring(0xb, 0x0) seccomp(0x0, 0x0, &(0x7f0000000580)={0x0, &(0x7f00000005c0)}) accept(0xffffffffffffffff, &(0x7f0000000300)=@l2, &(0x7f0000000380)=0xffffff14) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000000c0)={'ifb0\x00', @local}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) sysinfo(&(0x7f00000003c0)=""/158) pipe2(&(0x7f0000000680), 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000780), 0x14) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000006c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000500)) clock_gettime(0x0, &(0x7f0000000540)) timer_settime(0x0, 0x0, &(0x7f00000005c0)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000700)) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000001c0)=""/182) creat(&(0x7f0000000180)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") [ 1224.377035] netlink: 'syz-executor1': attribute type 3 has an invalid length. [ 1224.412404] kasan: CONFIG_KASAN_INLINE enabled [ 1224.418814] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1224.462934] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1224.469239] CPU: 1 PID: 9759 Comm: syz-executor1 Not tainted 4.19.0-rc4-next-20180918+ #74 [ 1224.477658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1224.487130] RIP: 0010:ctnetlink_alloc_filter+0xb9/0x200 [ 1224.492522] Code: 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 57 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 6c 24 40 49 8d 7d 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 06 [ 1224.511461] RSP: 0018:ffff880183dd7290 EFLAGS: 00010247 [ 1224.516854] RAX: dffffc0000000000 RBX: ffff8801d7a7a080 RCX: ffffc90006c85000 [ 1224.524127] RDX: 0000000000000000 RSI: ffffffff864dfefd RDI: 0000000000000004 [ 1224.531396] RBP: ffff880183dd72a8 R08: ffff88017fc9a380 R09: ffffed003b5a5b57 [ 1224.538674] R10: ffffed003b5a5b57 R11: ffff8801dad2dabb R12: ffff880183dd7500 [ 1224.545939] R13: 0000000000000000 R14: 0000000000000304 R15: 0000000000000020 [ 1224.553213] FS: 00007fea04acb700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 1224.561447] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1224.567330] CR2: 000000c444a99000 CR3: 000000016b054000 CR4: 00000000001406e0 [ 1224.574606] Call Trace: [ 1224.577203] ctnetlink_del_conntrack+0x65d/0x840 [ 1224.581968] ? ctnetlink_new_expect+0x6c0/0x6c0 [ 1224.586640] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1224.591577] ? __lock_is_held+0xb5/0x140 [ 1224.595647] ? ctnetlink_new_expect+0x6c0/0x6c0 [ 1224.600401] nfnetlink_rcv_msg+0xdd3/0x10c0 [ 1224.604737] ? nfnetlink_bind+0x3b0/0x3b0 [ 1224.608893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1224.614429] ? refcount_sub_and_test_checked+0x203/0x310 [ 1224.619884] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 1224.625369] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1224.630910] ? apparmor_cred_transfer+0x590/0x590 [ 1224.635755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1224.641356] netlink_rcv_skb+0x172/0x440 [ 1224.645425] ? nfnetlink_bind+0x3b0/0x3b0 [ 1224.649575] ? netlink_ack+0xb80/0xb80 [ 1224.653472] ? __netlink_ns_capable+0x100/0x130 [ 1224.658144] nfnetlink_rcv+0x1c0/0x4d0 [ 1224.662036] ? nfnetlink_rcv_batch+0x19b0/0x19b0 [ 1224.666804] ? kasan_check_write+0x14/0x20 [ 1224.671051] netlink_unicast+0x5a5/0x760 [ 1224.675134] ? netlink_attachskb+0x9a0/0x9a0 [ 1224.679555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1224.685102] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1224.690126] netlink_sendmsg+0xa18/0xfc0 [ 1224.694236] ? netlink_unicast+0x760/0x760 [ 1224.698472] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 1224.703408] ? apparmor_socket_sendmsg+0x29/0x30 [ 1224.708167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1224.713721] ? security_socket_sendmsg+0x94/0xc0 [ 1224.719529] ? netlink_unicast+0x760/0x760 [ 1224.723847] sock_sendmsg+0xd5/0x120 [ 1224.727574] ___sys_sendmsg+0x7fd/0x930 [ 1224.731554] ? copy_msghdr_from_user+0x580/0x580 [ 1224.736322] ? __fd_install+0x2b5/0x8f0 [ 1224.740316] ? check_preemption_disabled+0x48/0x200 [ 1224.745361] ? __fget_light+0x2e9/0x430 [ 1224.749357] ? fget_raw+0x20/0x20 [ 1224.752832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1224.758375] ? __fd_install+0x2f9/0x8f0 [ 1224.762356] ? get_unused_fd_flags+0x1a0/0x1a0 [ 1224.766946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1224.772502] ? sockfd_lookup_light+0xc5/0x160 [ 1224.777019] __sys_sendmsg+0x11d/0x280 [ 1224.780911] ? __ia32_sys_shutdown+0x80/0x80 [ 1224.785353] ? __x64_sys_futex+0x47f/0x6a0 [ 1224.789593] ? do_syscall_64+0x9a/0x820 [ 1224.793583] ? do_syscall_64+0x9a/0x820 [ 1224.797569] ? trace_hardirqs_off_caller+0x300/0x300 [ 1224.802677] ? ksys_ioctl+0x81/0xd0 [ 1224.806310] __x64_sys_sendmsg+0x78/0xb0 [ 1224.810378] do_syscall_64+0x1b9/0x820 [ 1224.814316] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1224.819691] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1224.824632] ? trace_hardirqs_off+0x310/0x310 [ 1224.829147] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1224.834170] ? recalc_sigpending_tsk+0x180/0x180 [ 1224.838953] ? kasan_check_write+0x14/0x20 [ 1224.843212] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1224.848070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1224.853258] RIP: 0033:0x4572d9 [ 1224.856468] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1224.875384] RSP: 002b:00007fea04acac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1224.883096] RAX: ffffffffffffffda RBX: 00007fea04acb6d4 RCX: 00000000004572d9 [ 1224.890364] RDX: 0000000000000000 RSI: 0000000020011fc8 RDI: 0000000000000005 [ 1224.897651] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1224.904934] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff 03:33:55 executing program 0: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000500), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000600)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000740)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x0) pkey_alloc(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='em1$\x00'}, 0x10) clock_gettime(0x0, &(0x7f0000000340)) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000240)={0x18}, 0x18) write$evdev(0xffffffffffffffff, &(0x7f0000000200), 0x0) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000540)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000980)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b80)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d40)) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000d80)) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001340), &(0x7f0000001380)=0xc) getpgrp(0x0) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002e80), 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) msgget$private(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:55 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000380), &(0x7f00000003c0)=0x4) [ 1224.912203] R13: 00000000004d4b60 R14: 00000000004c90ab R15: 0000000000000000 [ 1224.919483] Modules linked in: [ 1224.963818] kobject: 'loop5' (0000000090f20d56): kobject_uevent_env [ 1224.971468] kobject: 'loop5' (0000000090f20d56): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1225.041353] sctp: [Deprecated]: syz-executor5 (pid 9768) Use of int in maxseg socket option. [ 1225.041353] Use struct sctp_assoc_value instead [ 1225.062131] ---[ end trace 3144920dc13188f8 ]--- [ 1225.067015] RIP: 0010:ctnetlink_alloc_filter+0xb9/0x200 [ 1225.078068] Code: 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 57 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 6c 24 40 49 8d 7d 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 06 [ 1225.117874] RSP: 0018:ffff880183dd7290 EFLAGS: 00010247 [ 1225.128976] RAX: dffffc0000000000 RBX: ffff8801d7a7a080 RCX: ffffc90006c85000 [ 1225.144147] RDX: 0000000000000000 RSI: ffffffff864dfefd RDI: 0000000000000004 [ 1225.159320] RBP: ffff880183dd72a8 R08: ffff88017fc9a380 R09: ffffed003b5a5b57 [ 1225.177576] R10: ffffed003b5a5b57 R11: ffff8801dad2dabb R12: ffff880183dd7500 [ 1225.197005] R13: 0000000000000000 R14: 0000000000000304 R15: 0000000000000020 [ 1225.216475] FS: 00007fea04acb700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 1225.239730] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1225.250778] CR2: 00007fea04aa9db8 CR3: 000000016b054000 CR4: 00000000001406f0 [ 1225.258546] Kernel panic - not syncing: Fatal exception [ 1225.265026] Kernel Offset: disabled [ 1225.268651] Rebooting in 86400 seconds..