faa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:44 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:44 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:44 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:45 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:00:45 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:45 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:00:45 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:45 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:00:45 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:45 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:45 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:45 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:46 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:46 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:00:46 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:00:46 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:46 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:46 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:00:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:46 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:46 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:46 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:46 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:47 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:47 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:47 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:00:47 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:00:47 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:47 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 00:00:47 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:47 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:47 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:47 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) [ 171.787479] audit: type=1326 audit(1536796847.787:2): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7074 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 00:00:47 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:48 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:48 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") [ 172.105775] audit: type=1326 audit(1536796848.115:3): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7085 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 00:00:48 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:00:48 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 00:00:48 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:48 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:48 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:00:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) [ 172.735165] audit: type=1326 audit(1536796848.745:4): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7100 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 00:00:48 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:48 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:00:48 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) preadv(0xffffffffffffffff, &(0x7f0000000980), 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind(0xffffffffffffffff, &(0x7f00000001c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000a80)=0xc) syz_open_procfs(0x0, &(0x7f0000000a00)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@loopback, @local}, &(0x7f0000000680)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'bpq0\x00'}) recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000000740)=@hci, 0xffffffffffffff05, &(0x7f0000000b80), 0x1, &(0x7f0000000c00)=""/4096, 0x1000}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001f40)=0xe8) sysfs$1(0x1, &(0x7f0000000300)='/dev/rtc0\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@dev, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000002140)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002300)={@dev, @local}, &(0x7f0000002340)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002400)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'bpq0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003fc0)={@remote}, &(0x7f0000004000)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004080)=0x14, 0x0) 00:00:49 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:49 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") [ 173.234506] audit: type=1326 audit(1536796849.244:5): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7124 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 00:00:49 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:00:49 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:00:49 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:49 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:00:49 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") [ 173.723669] audit: type=1326 audit(1536796849.733:6): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7140 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 00:00:49 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(0xffffffffffffffff, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(0xffffffffffffffff, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:49 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000240), 0x0, &(0x7f0000000540)}, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getegid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 00:00:50 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) preadv(0xffffffffffffffff, &(0x7f0000000980), 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind(0xffffffffffffffff, &(0x7f00000001c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000a80)=0xc) syz_open_procfs(0x0, &(0x7f0000000a00)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@loopback, @local}, &(0x7f0000000680)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'bpq0\x00'}) recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000000740)=@hci, 0xffffffffffffff05, &(0x7f0000000b80), 0x1, &(0x7f0000000c00)=""/4096, 0x1000}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001f40)=0xe8) sysfs$1(0x1, &(0x7f0000000300)='/dev/rtc0\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@dev, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000002140)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002300)={@dev, @local}, &(0x7f0000002340)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002400)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'bpq0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003fc0)={@remote}, &(0x7f0000004000)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004080)=0x14, 0x0) [ 173.995246] audit: type=1326 audit(1536796850.005:7): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7157 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 00:00:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:50 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002b80)=0x14) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000500)='nbd\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@multicast2, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={@local, @broadcast}, &(0x7f0000000440)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002580)={{{@in=@remote, @in6=@remote}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000026c0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000027c0)=0xe8) 00:00:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:50 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:00:51 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:00:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:51 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:00:51 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:00:51 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 00:00:51 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:00:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:51 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:00:51 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:00:52 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:00:52 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:00:52 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:00:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:52 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:00:53 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:00:53 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:00:53 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:00:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:53 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:00:53 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:00:54 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:00:54 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:00:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:54 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:00:54 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:00:54 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:00:55 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) 00:00:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:55 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:00:55 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:00:55 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:00:55 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:00:55 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) 00:00:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:56 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:00:56 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) 00:00:56 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:00:56 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:00:56 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) 00:00:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:57 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:00:57 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) 00:00:57 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:00:57 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:00:57 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:00:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:58 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) 00:00:58 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:00:58 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:00:58 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:00:58 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:00:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x0, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:59 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:00:59 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:00:59 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:00:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x0, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:59 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:00:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x0, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:00:59 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x0, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:01:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(0xffffffffffffffff, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:01:00 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:00 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:00 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:00 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:00 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(0xffffffffffffffff, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:01:01 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:01 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:01 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:01 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:01 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(0xffffffffffffffff, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x120, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:01:02 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:02 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:02 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:02 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:02 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:02 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:03 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x0, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:01:03 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:03 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:03 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:03 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:03 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:03 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:04 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:04 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x0, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) 00:01:04 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:04 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:04 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:04 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:05 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x3c6701687271e508, 0x0, 0x0, 0x4f) read(0xffffffffffffffff, &(0x7f0000000380)=""/172, 0xffffffc7) 00:01:05 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:05 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:05 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:06 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:06 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:06 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:06 executing program 0: 00:01:06 executing program 0: 00:01:06 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:06 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:06 executing program 0: 00:01:07 executing program 0: 00:01:07 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:07 executing program 0: 00:01:07 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:07 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:07 executing program 0: 00:01:07 executing program 0: prctl$seccomp(0x23, 0x2, &(0x7f0000000040)={0x0, &(0x7f00000005c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000380)) ioperm(0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) chroot(&(0x7f0000000300)='./file0\x00') munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) geteuid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x0, &(0x7f00000003c0), &(0x7f00000000c0)) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000480)={'broute\x00'}, &(0x7f0000000500)=0x78) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) getgroups(0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000000240)="360f72f1ff6969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:07 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:07 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:08 executing program 0: prctl$seccomp(0x23, 0x2, &(0x7f0000000040)={0x0, &(0x7f00000005c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000380)) ioperm(0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) chroot(&(0x7f0000000300)='./file0\x00') munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) geteuid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x0, &(0x7f00000003c0), &(0x7f00000000c0)) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000480)={'broute\x00'}, &(0x7f0000000500)=0x78) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) getgroups(0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000000240)="360f72f1ff6969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:08 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:08 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:08 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:08 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:08 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:08 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:09 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:09 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:09 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:09 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:09 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:09 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:10 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:10 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:10 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:10 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:10 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:10 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:11 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:11 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:11 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:11 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:11 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:12 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:12 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:12 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:12 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:12 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:12 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:13 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:13 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:13 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:13 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:14 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:14 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:14 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:14 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:14 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) 00:01:14 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:15 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:15 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:15 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:15 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:15 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:15 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) 00:01:16 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:16 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:16 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:16 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:16 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:17 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:17 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:17 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) 00:01:17 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:17 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:17 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:18 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:18 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:18 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:18 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:19 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:19 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:19 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:19 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:19 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:19 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:20 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:20 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:20 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:20 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:20 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:21 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:21 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:21 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:21 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:21 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:21 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:22 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:22 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:22 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:22 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:22 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:22 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:23 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:23 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:23 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:23 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:23 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:23 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:24 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:24 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:24 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:24 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:24 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:25 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:25 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:25 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:25 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:25 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:26 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:26 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:26 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:26 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:26 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:27 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:27 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:27 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:27 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:27 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:27 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:28 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:28 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:28 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:28 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:28 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:29 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:29 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:29 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:29 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:29 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:29 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:30 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:30 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:30 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:30 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:30 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:31 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:31 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:31 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:31 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:31 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:32 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:32 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:32 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:32 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:32 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:32 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:33 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:33 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:33 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:33 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:33 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:33 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:33 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:33 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:34 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:34 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:34 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:34 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:34 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:34 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:34 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:35 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:35 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:35 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:35 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:35 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:35 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:36 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:36 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:36 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:36 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:36 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:37 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:37 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:37 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:37 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:38 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:38 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:38 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:38 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:38 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:39 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:39 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:39 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:39 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:39 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:40 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:40 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:40 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:40 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:40 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:40 executing program 2: keyctl$set_reqkey_keyring(0x4, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:41 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:41 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:41 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:41 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:41 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:41 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:41 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:41 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:42 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:42 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:42 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:42 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:42 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:42 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:42 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:43 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:43 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:43 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:43 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:43 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:43 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:43 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:43 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:43 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:43 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 227.998495] audit: type=1326 audit(1536796904.008:8): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8421 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 00:01:44 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:44 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 00:01:44 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) [ 228.332496] audit: type=1326 audit(1536796904.342:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8432 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 00:01:44 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:44 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:44 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 228.674776] audit: type=1326 audit(1536796904.682:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8447 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 00:01:44 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000240)=""/165) open(&(0x7f0000000440)='./file1\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe19fa380f3821f0817e768cc8000081b5e5bc2b0000002167f252bab204000000cac441795b64ae01dae5f3460f58f9c4c37d195700d60f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x3df}) fstat(0xffffffffffffffff, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000004c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001d40)={&(0x7f0000001d00)='./file0\x00'}, 0x10) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a00)={{{@in6, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000001b00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000200)=0xc) syz_open_procfs(0x0, &(0x7f0000000880)="6e65742f6e6673667300fb9339e9216700edb04540001018a2bedb9c2509dd75911dfba4c8defaaf78b4e83493221d0c20b38a16ae187315cfa06cb471901ea636d6ed899e50d9d166d450aeb88ad7dd6e33827403f86ecdf2d0c1c1e206538e4f3e014f077554715069bb2b2cf7c0207d5ac147644ae9e9a1426d29b0120c81dc1acb1ec3aa57a8d1091ad78f5d980437ae39b006b15a1bb273c59fdadb665fd2ed5aa9414d1287ecbd656890e1c1d0db643bc6b2fe2eb69e3e093bc8b0ccab89492c5564cb9735153ca47bee672efc8f874a2e2830099a3037b26cb67bac26ade165b2716830cda29395e5d1ecc91ea8b1b581acc33a26b538bfab51f695066a6158f2a4d1c21a3a724aaa7e72d381d1797c384187438fcc5360f0bf9ed8a7f82e68990519c87360f4bb62a028055b5235717f6183a6ae8c526c3f85d5ad8e22fea9c3527e3caf53f9255ac50274d5f30804971762fce6409872bc4135c6d75f47ee770725f00c9ded20fd2850cdf7b9a7391cfb9287eece294272c6148a7989a8c2fd776808bf682b85") write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 00:01:45 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:45 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:45 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:45 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:45 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:45 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) sendmmsg(r0, &(0x7f0000003740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="f82fc618277e8c6cccf2e672c95d4621274309f8c694b8a4163bfe556e8d692952d6270f17e7a1764616dee1ebb62fd0e09e3194b4366a82c596b0cf7786afe62613c9e61c5e9dd8096d2e77c392a3fd531b27674bedf981ef2d7f791c9fab4d1144ab3d58501507eb278943c306", 0x6e}], 0x1, &(0x7f0000000880), 0x0, 0x24004080}, 0x6}, {{&(0x7f0000000640)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "39b153636f1a5029cfe18848e617d56e7fc42dfbb01197132a22f36c60985bfaf15bc5639da03990dac7b2ff5522d479dba77c15ead6877b52517e5e82af3f"}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000001ac0)}}], 0x2, 0x14) 00:01:46 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:46 executing program 2: clock_gettime(0x2, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0bea9451779dcdca62dce73fe95c422cdb81a640f01ef38217f1a663643dfe000006664f30fb8f2f00fbab20400cd00ca6c205bdae5e54175450f2e1af047b3aaeb381d776667431a0c8871fb0703") pipe(&(0x7f0000000600)) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'veth1_to_team\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002840)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002880)={{{@in=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000029c0)={@remote, @remote}, &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in6=@mcast2}}}, &(0x7f0000002b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002bc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000040c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004100)={@rand_addr, @multicast2}, &(0x7f0000004140)=0xc) accept(0xffffffffffffff9c, &(0x7f0000004180)=@hci, &(0x7f0000004200)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000042c0)={'syzkaller0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000004480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000044c0)={0x0, @multicast1, @broadcast}, &(0x7f0000004500)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000004540)=@hci, &(0x7f00000045c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007e00)={0x0, @empty, @rand_addr}, &(0x7f0000007e40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000008380)={&(0x7f0000000640), 0xc, &(0x7f0000008340)={&(0x7f0000007e80)={0x14}, 0x14}}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000500)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b00)='/dev/autofs\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@remote, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000013c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0x43a) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) poll(&(0x7f00000008c0), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') io_setup(0x0, &(0x7f0000000780)) io_submit(0x0, 0x0, &(0x7f0000000880)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000080)=@proc, 0xc, &(0x7f0000001380), 0x0, &(0x7f0000001600)}, 0x0) move_pages(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000700), &(0x7f0000000740), 0x0) 00:01:46 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:46 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:46 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:47 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:47 executing program 2: clock_gettime(0x2, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0bea9451779dcdca62dce73fe95c422cdb81a640f01ef38217f1a663643dfe000006664f30fb8f2f00fbab20400cd00ca6c205bdae5e54175450f2e1af047b3aaeb381d776667431a0c8871fb0703") pipe(&(0x7f0000000600)) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'veth1_to_team\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002840)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002880)={{{@in=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000029c0)={@remote, @remote}, &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in6=@mcast2}}}, &(0x7f0000002b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002bc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000040c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004100)={@rand_addr, @multicast2}, &(0x7f0000004140)=0xc) accept(0xffffffffffffff9c, &(0x7f0000004180)=@hci, &(0x7f0000004200)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000042c0)={'syzkaller0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000004480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000044c0)={0x0, @multicast1, @broadcast}, &(0x7f0000004500)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000004540)=@hci, &(0x7f00000045c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007e00)={0x0, @empty, @rand_addr}, &(0x7f0000007e40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000008380)={&(0x7f0000000640), 0xc, &(0x7f0000008340)={&(0x7f0000007e80)={0x14}, 0x14}}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000500)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b00)='/dev/autofs\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@remote, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000013c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0x43a) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) poll(&(0x7f00000008c0), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') io_setup(0x0, &(0x7f0000000780)) io_submit(0x0, 0x0, &(0x7f0000000880)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000080)=@proc, 0xc, &(0x7f0000001380), 0x0, &(0x7f0000001600)}, 0x0) move_pages(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000700), &(0x7f0000000740), 0x0) 00:01:47 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:47 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:47 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:48 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:48 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:48 executing program 2: clock_gettime(0x2, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0bea9451779dcdca62dce73fe95c422cdb81a640f01ef38217f1a663643dfe000006664f30fb8f2f00fbab20400cd00ca6c205bdae5e54175450f2e1af047b3aaeb381d776667431a0c8871fb0703") pipe(&(0x7f0000000600)) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'veth1_to_team\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002840)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002880)={{{@in=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000029c0)={@remote, @remote}, &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in6=@mcast2}}}, &(0x7f0000002b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002bc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000040c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004100)={@rand_addr, @multicast2}, &(0x7f0000004140)=0xc) accept(0xffffffffffffff9c, &(0x7f0000004180)=@hci, &(0x7f0000004200)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000042c0)={'syzkaller0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000004480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000044c0)={0x0, @multicast1, @broadcast}, &(0x7f0000004500)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000004540)=@hci, &(0x7f00000045c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007e00)={0x0, @empty, @rand_addr}, &(0x7f0000007e40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000008380)={&(0x7f0000000640), 0xc, &(0x7f0000008340)={&(0x7f0000007e80)={0x14}, 0x14}}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000500)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b00)='/dev/autofs\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@remote, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000013c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0x43a) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) poll(&(0x7f00000008c0), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') io_setup(0x0, &(0x7f0000000780)) io_submit(0x0, 0x0, &(0x7f0000000880)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000080)=@proc, 0xc, &(0x7f0000001380), 0x0, &(0x7f0000001600)}, 0x0) move_pages(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000700), &(0x7f0000000740), 0x0) 00:01:48 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:48 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:49 executing program 2: clock_gettime(0x2, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0bea9451779dcdca62dce73fe95c422cdb81a640f01ef38217f1a663643dfe000006664f30fb8f2f00fbab20400cd00ca6c205bdae5e54175450f2e1af047b3aaeb381d776667431a0c8871fb0703") pipe(&(0x7f0000000600)) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'veth1_to_team\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002840)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002880)={{{@in=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000029c0)={@remote, @remote}, &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in6=@mcast2}}}, &(0x7f0000002b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002bc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000040c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004100)={@rand_addr, @multicast2}, &(0x7f0000004140)=0xc) accept(0xffffffffffffff9c, &(0x7f0000004180)=@hci, &(0x7f0000004200)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000042c0)={'syzkaller0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000004480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000044c0)={0x0, @multicast1, @broadcast}, &(0x7f0000004500)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000004540)=@hci, &(0x7f00000045c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007e00)={0x0, @empty, @rand_addr}, &(0x7f0000007e40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000008380)={&(0x7f0000000640), 0xc, &(0x7f0000008340)={&(0x7f0000007e80)={0x14}, 0x14}}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000500)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b00)='/dev/autofs\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@remote, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000013c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0x43a) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) poll(&(0x7f00000008c0), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') io_setup(0x0, &(0x7f0000000780)) io_submit(0x0, 0x0, &(0x7f0000000880)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000080)=@proc, 0xc, &(0x7f0000001380), 0x0, &(0x7f0000001600)}, 0x0) move_pages(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000700), &(0x7f0000000740), 0x0) 00:01:49 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:49 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:49 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:49 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:49 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:49 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:49 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:50 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:50 executing program 2: clock_gettime(0x2, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0bea9451779dcdca62dce73fe95c422cdb81a640f01ef38217f1a663643dfe000006664f30fb8f2f00fbab20400cd00ca6c205bdae5e54175450f2e1af047b3aaeb381d776667431a0c8871fb0703") pipe(&(0x7f0000000600)) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'veth1_to_team\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002840)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002880)={{{@in=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000029c0)={@remote, @remote}, &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in6=@mcast2}}}, &(0x7f0000002b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002bc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000040c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004100)={@rand_addr, @multicast2}, &(0x7f0000004140)=0xc) accept(0xffffffffffffff9c, &(0x7f0000004180)=@hci, &(0x7f0000004200)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000042c0)={'syzkaller0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000004480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000044c0)={0x0, @multicast1, @broadcast}, &(0x7f0000004500)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000004540)=@hci, &(0x7f00000045c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007e00)={0x0, @empty, @rand_addr}, &(0x7f0000007e40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000008380)={&(0x7f0000000640), 0xc, &(0x7f0000008340)={&(0x7f0000007e80)={0x14}, 0x14}}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000500)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b00)='/dev/autofs\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@remote, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000013c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0x43a) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) poll(&(0x7f00000008c0), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') io_setup(0x0, &(0x7f0000000780)) io_submit(0x0, 0x0, &(0x7f0000000880)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000080)=@proc, 0xc, &(0x7f0000001380), 0x0, &(0x7f0000001600)}, 0x0) 00:01:50 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:50 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:50 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:50 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:51 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:51 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:51 executing program 2: clock_gettime(0x2, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0bea9451779dcdca62dce73fe95c422cdb81a640f01ef38217f1a663643dfe000006664f30fb8f2f00fbab20400cd00ca6c205bdae5e54175450f2e1af047b3aaeb381d776667431a0c8871fb0703") pipe(&(0x7f0000000600)) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'veth1_to_team\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002840)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002880)={{{@in=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000029c0)={@remote, @remote}, &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in6=@mcast2}}}, &(0x7f0000002b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002bc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000040c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004100)={@rand_addr, @multicast2}, &(0x7f0000004140)=0xc) accept(0xffffffffffffff9c, &(0x7f0000004180)=@hci, &(0x7f0000004200)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000042c0)={'syzkaller0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000004480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000044c0)={0x0, @multicast1, @broadcast}, &(0x7f0000004500)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000004540)=@hci, &(0x7f00000045c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007e00)={0x0, @empty, @rand_addr}, &(0x7f0000007e40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000008380)={&(0x7f0000000640), 0xc, &(0x7f0000008340)={&(0x7f0000007e80)={0x14}, 0x14}}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000500)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b00)='/dev/autofs\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@remote, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000013c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0x43a) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) poll(&(0x7f00000008c0), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') io_setup(0x0, &(0x7f0000000780)) io_submit(0x0, 0x0, &(0x7f0000000880)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000080)=@proc, 0xc, &(0x7f0000001380), 0x0, &(0x7f0000001600)}, 0x0) 00:01:51 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:51 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:52 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:52 executing program 2: clock_gettime(0x2, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0bea9451779dcdca62dce73fe95c422cdb81a640f01ef38217f1a663643dfe000006664f30fb8f2f00fbab20400cd00ca6c205bdae5e54175450f2e1af047b3aaeb381d776667431a0c8871fb0703") pipe(&(0x7f0000000600)) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'veth1_to_team\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002840)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002880)={{{@in=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000029c0)={@remote, @remote}, &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in6=@mcast2}}}, &(0x7f0000002b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002bc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000040c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004100)={@rand_addr, @multicast2}, &(0x7f0000004140)=0xc) accept(0xffffffffffffff9c, &(0x7f0000004180)=@hci, &(0x7f0000004200)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000042c0)={'syzkaller0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000004480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000044c0)={0x0, @multicast1, @broadcast}, &(0x7f0000004500)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000004540)=@hci, &(0x7f00000045c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007e00)={0x0, @empty, @rand_addr}, &(0x7f0000007e40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000008380)={&(0x7f0000000640), 0xc, &(0x7f0000008340)={&(0x7f0000007e80)={0x14}, 0x14}}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000500)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b00)='/dev/autofs\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@remote, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000013c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0x43a) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) poll(&(0x7f00000008c0), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') io_setup(0x0, &(0x7f0000000780)) io_submit(0x0, 0x0, &(0x7f0000000880)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000080)=@proc, 0xc, &(0x7f0000001380), 0x0, &(0x7f0000001600)}, 0x0) 00:01:52 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:52 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:52 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:53 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:53 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) geteuid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:53 executing program 2: clock_gettime(0x2, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0bea9451779dcdca62dce73fe95c422cdb81a640f01ef38217f1a663643dfe000006664f30fb8f2f00fbab20400cd00ca6c205bdae5e54175450f2e1af047b3aaeb381d776667431a0c8871fb0703") pipe(&(0x7f0000000600)) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'veth1_to_team\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002840)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002880)={{{@in=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000029c0)={@remote, @remote}, &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in6=@mcast2}}}, &(0x7f0000002b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002bc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000040c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004100)={@rand_addr, @multicast2}, &(0x7f0000004140)=0xc) accept(0xffffffffffffff9c, &(0x7f0000004180)=@hci, &(0x7f0000004200)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000042c0)={'syzkaller0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000004480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000044c0)={0x0, @multicast1, @broadcast}, &(0x7f0000004500)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000004540)=@hci, &(0x7f00000045c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007e00)={0x0, @empty, @rand_addr}, &(0x7f0000007e40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000008380)={&(0x7f0000000640), 0xc, &(0x7f0000008340)={&(0x7f0000007e80)={0x14}, 0x14}}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000500)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b00)='/dev/autofs\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@remote, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000013c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0x43a) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) poll(&(0x7f00000008c0), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') io_setup(0x0, &(0x7f0000000780)) io_submit(0x0, 0x0, &(0x7f0000000880)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) move_pages(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000700), &(0x7f0000000740), 0x0) 00:01:53 executing program 3: memfd_create(&(0x7f0000000200), 0x0) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:53 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:53 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:54 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:54 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:54 executing program 2: clock_gettime(0x2, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0bea9451779dcdca62dce73fe95c422cdb81a640f01ef38217f1a663643dfe000006664f30fb8f2f00fbab20400cd00ca6c205bdae5e54175450f2e1af047b3aaeb381d776667431a0c8871fb0703") pipe(&(0x7f0000000600)) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'veth1_to_team\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002840)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002880)={{{@in=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000029c0)={@remote, @remote}, &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in6=@mcast2}}}, &(0x7f0000002b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002bc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000040c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004100)={@rand_addr, @multicast2}, &(0x7f0000004140)=0xc) accept(0xffffffffffffff9c, &(0x7f0000004180)=@hci, &(0x7f0000004200)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000042c0)={'syzkaller0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000004480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000044c0)={0x0, @multicast1, @broadcast}, &(0x7f0000004500)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000004540)=@hci, &(0x7f00000045c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007e00)={0x0, @empty, @rand_addr}, &(0x7f0000007e40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000008380)={&(0x7f0000000640), 0xc, &(0x7f0000008340)={&(0x7f0000007e80)={0x14}, 0x14}}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000500)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b00)='/dev/autofs\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@remote, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000013c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0x43a) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) poll(&(0x7f00000008c0), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') io_setup(0x0, &(0x7f0000000780)) io_submit(0x0, 0x0, &(0x7f0000000880)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) move_pages(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000700), &(0x7f0000000740), 0x0) 00:01:54 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:54 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:54 executing program 3: memfd_create(&(0x7f0000000200), 0x0) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:55 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:55 executing program 2: clock_gettime(0x2, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0bea9451779dcdca62dce73fe95c422cdb81a640f01ef38217f1a663643dfe000006664f30fb8f2f00fbab20400cd00ca6c205bdae5e54175450f2e1af047b3aaeb381d776667431a0c8871fb0703") pipe(&(0x7f0000000600)) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'veth1_to_team\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002840)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002880)={{{@in=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000029c0)={@remote, @remote}, &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in6=@mcast2}}}, &(0x7f0000002b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002bc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000040c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004100)={@rand_addr, @multicast2}, &(0x7f0000004140)=0xc) accept(0xffffffffffffff9c, &(0x7f0000004180)=@hci, &(0x7f0000004200)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000042c0)={'syzkaller0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000004480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000044c0)={0x0, @multicast1, @broadcast}, &(0x7f0000004500)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000004540)=@hci, &(0x7f00000045c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007e00)={0x0, @empty, @rand_addr}, &(0x7f0000007e40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000008380)={&(0x7f0000000640), 0xc, &(0x7f0000008340)={&(0x7f0000007e80)={0x14}, 0x14}}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000500)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b00)='/dev/autofs\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@remote, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000013c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0x43a) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) poll(&(0x7f00000008c0), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') io_setup(0x0, &(0x7f0000000780)) io_submit(0x0, 0x0, &(0x7f0000000880)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) move_pages(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000700), &(0x7f0000000740), 0x0) 00:01:55 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:55 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:56 executing program 3: memfd_create(&(0x7f0000000200), 0x0) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:56 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:56 executing program 2: clock_gettime(0x2, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0bea9451779dcdca62dce73fe95c422cdb81a640f01ef38217f1a663643dfe000006664f30fb8f2f00fbab20400cd00ca6c205bdae5e54175450f2e1af047b3aaeb381d776667431a0c8871fb0703") pipe(&(0x7f0000000600)) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'veth1_to_team\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002840)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002880)={{{@in=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000029c0)={@remote, @remote}, &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in6=@mcast2}}}, &(0x7f0000002b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002bc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000040c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004100)={@rand_addr, @multicast2}, &(0x7f0000004140)=0xc) accept(0xffffffffffffff9c, &(0x7f0000004180)=@hci, &(0x7f0000004200)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000042c0)={'syzkaller0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000004480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000044c0)={0x0, @multicast1, @broadcast}, &(0x7f0000004500)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000004540)=@hci, &(0x7f00000045c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007e00)={0x0, @empty, @rand_addr}, &(0x7f0000007e40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000008380)={&(0x7f0000000640), 0xc, &(0x7f0000008340)={&(0x7f0000007e80)={0x14}, 0x14}}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000500)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b00)='/dev/autofs\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@remote, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000013c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0x43a) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) poll(&(0x7f00000008c0), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') io_setup(0x0, &(0x7f0000000780)) io_submit(0x0, 0x0, &(0x7f0000000880)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000080)=@proc, 0xc, &(0x7f0000001380), 0x0, &(0x7f0000001600)}, 0x0) move_pages(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000700), &(0x7f0000000740), 0x0) 00:01:56 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:56 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:56 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:57 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:57 executing program 2: clock_gettime(0x2, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0bea9451779dcdca62dce73fe95c422cdb81a640f01ef38217f1a663643dfe000006664f30fb8f2f00fbab20400cd00ca6c205bdae5e54175450f2e1af047b3aaeb381d776667431a0c8871fb0703") pipe(&(0x7f0000000600)) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'veth1_to_team\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002840)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002880)={{{@in=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000029c0)={@remote, @remote}, &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in6=@mcast2}}}, &(0x7f0000002b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002bc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000040c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004100)={@rand_addr, @multicast2}, &(0x7f0000004140)=0xc) accept(0xffffffffffffff9c, &(0x7f0000004180)=@hci, &(0x7f0000004200)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000042c0)={'syzkaller0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000004480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000044c0)={0x0, @multicast1, @broadcast}, &(0x7f0000004500)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000004540)=@hci, &(0x7f00000045c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007e00)={0x0, @empty, @rand_addr}, &(0x7f0000007e40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000008380)={&(0x7f0000000640), 0xc, &(0x7f0000008340)={&(0x7f0000007e80)={0x14}, 0x14}}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000500)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b00)='/dev/autofs\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@remote, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000013c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0x43a) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) poll(&(0x7f00000008c0), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') io_setup(0x0, &(0x7f0000000780)) io_submit(0x0, 0x0, &(0x7f0000000880)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000080)=@proc, 0xc, &(0x7f0000001380), 0x0, &(0x7f0000001600)}, 0x0) move_pages(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000700), &(0x7f0000000740), 0x0) 00:01:57 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:57 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:57 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:57 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:57 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:57 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:57 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002800)='\x00', 0xffffffffffffffff}, 0x30) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:58 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:58 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:58 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:58 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:58 executing program 2: clock_gettime(0x2, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0bea9451779dcdca62dce73fe95c422cdb81a640f01ef38217f1a663643dfe000006664f30fb8f2f00fbab20400cd00ca6c205bdae5e54175450f2e1af047b3aaeb381d776667431a0c8871fb0703") pipe(&(0x7f0000000600)) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'veth1_to_team\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002840)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002880)={{{@in=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000029c0)={@remote, @remote}, &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in6=@mcast2}}}, &(0x7f0000002b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002bc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000040c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004100)={@rand_addr, @multicast2}, &(0x7f0000004140)=0xc) accept(0xffffffffffffff9c, &(0x7f0000004180)=@hci, &(0x7f0000004200)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000042c0)={'syzkaller0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000004480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000044c0)={0x0, @multicast1, @broadcast}, &(0x7f0000004500)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000004540)=@hci, &(0x7f00000045c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007e00)={0x0, @empty, @rand_addr}, &(0x7f0000007e40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000008380)={&(0x7f0000000640), 0xc, &(0x7f0000008340)={&(0x7f0000007e80)={0x14}, 0x14}}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000500)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b00)='/dev/autofs\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@remote, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000013c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0x43a) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) poll(&(0x7f00000008c0), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') io_setup(0x0, &(0x7f0000000780)) io_submit(0x0, 0x0, &(0x7f0000000880)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000080)=@proc, 0xc, &(0x7f0000001380), 0x0, &(0x7f0000001600)}, 0x0) move_pages(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000700), &(0x7f0000000740), 0x0) 00:01:58 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:58 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:58 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:58 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:58 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:58 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:59 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:01:59 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:59 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:01:59 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:59 executing program 2: clock_gettime(0x2, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0bea9451779dcdca62dce73fe95c422cdb81a640f01ef38217f1a663643dfe000006664f30fb8f2f00fbab20400cd00ca6c205bdae5e54175450f2e1af047b3aaeb381d776667431a0c8871fb0703") pipe(&(0x7f0000000600)) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'veth1_to_team\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002840)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002880)={{{@in=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000029c0)={@remote, @remote}, &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in6=@mcast2}}}, &(0x7f0000002b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002bc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000040c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004100)={@rand_addr, @multicast2}, &(0x7f0000004140)=0xc) accept(0xffffffffffffff9c, &(0x7f0000004180)=@hci, &(0x7f0000004200)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000042c0)={'syzkaller0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000004480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000044c0)={0x0, @multicast1, @broadcast}, &(0x7f0000004500)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000004540)=@hci, &(0x7f00000045c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007e00)={0x0, @empty, @rand_addr}, &(0x7f0000007e40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000008380)={&(0x7f0000000640), 0xc, &(0x7f0000008340)={&(0x7f0000007e80)={0x14}, 0x14}}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000500)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b00)='/dev/autofs\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@remote, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000013c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0x43a) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) poll(&(0x7f00000008c0), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') io_setup(0x0, &(0x7f0000000780)) io_submit(0x0, 0x0, &(0x7f0000000880)) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000080)=@proc, 0xc, &(0x7f0000001380), 0x0, &(0x7f0000001600)}, 0x0) move_pages(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000700), &(0x7f0000000740), 0x0) 00:01:59 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:01:59 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:59 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) 00:01:59 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:01:59 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) [ 243.959674] audit: type=1326 audit(1536796919.969:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8822 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 00:02:00 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) [ 244.167472] audit: type=1326 audit(1536796920.177:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8828 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 00:02:00 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:02:00 executing program 0: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000640)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='eth0systemwlan1(&+\x00', 0x13, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) gettid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)=']vmnet1\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000015c0)='eth0systemwlan1(&+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001740)=0xe8) getgid() getpgrp(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) gettid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getgid() getpid() stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getgid() geteuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002d40)='\x00', 0xffffffffffffffff}, 0x30) getuid() getgroups(0x0, &(0x7f0000002e00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 00:02:00 executing program 2: clock_gettime(0x2, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0bea9451779dcdca62dce73fe95c422cdb81a640f01ef38217f1a663643dfe000006664f30fb8f2f00fbab20400cd00ca6c205bdae5e54175450f2e1af047b3aaeb381d776667431a0c8871fb0703") pipe(&(0x7f0000000600)) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'veth1_to_team\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002840)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002880)={{{@in=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000029c0)={@remote, @remote}, &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in6=@mcast2}}}, &(0x7f0000002b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002bc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000040c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004100)={@rand_addr, @multicast2}, &(0x7f0000004140)=0xc) accept(0xffffffffffffff9c, &(0x7f0000004180)=@hci, &(0x7f0000004200)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000042c0)={'syzkaller0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000004480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000044c0)={0x0, @multicast1, @broadcast}, &(0x7f0000004500)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000004540)=@hci, &(0x7f00000045c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007e00)={0x0, @empty, @rand_addr}, &(0x7f0000007e40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000008380)={&(0x7f0000000640), 0xc, &(0x7f0000008340)={&(0x7f0000007e80)={0x14}, 0x14}}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000500)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b00)='/dev/autofs\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@remote, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000013c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0x43a) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) poll(&(0x7f00000008c0), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') io_setup(0x0, &(0x7f0000000780)) io_submit(0x0, 0x0, &(0x7f0000000880)) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000080)=@proc, 0xc, &(0x7f0000001380), 0x0, &(0x7f0000001600)}, 0x0) move_pages(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000700), &(0x7f0000000740), 0x0) 00:02:00 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000480)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0xfffffffffffffffd}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@remote, @broadcast, @multicast2}, 0xc) getrusage(0x0, &(0x7f0000000b40)) getuid() getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 00:02:00 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 00:02:00 executing program 5: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)=""/86) dup(0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) getgid() request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000280)='systemcpuset,vmnet0\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) [ 244.926623] audit: type=1326 audit(1536796920.936:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8844 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 244.991036] audit: type=1326 audit(1536796920.969:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8845 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 00:02:01 executing program 3: memfd_create(&(0x7f0000000200), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0xffffffffffffff2b) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getcwd(&(0x7f0000000380)=""/115, 0x73) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) add_key(&(0x7f0000001080)='pkcs7_test\x00', &(0x7f00000010c0), 0x0, 0x0, 0xfffffffffffffffc) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000001c0)) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000440)=""/101, 0x65, 0x0, &(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80) getgid() ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getpriority(0x0, 0x0) getpriority(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000200)}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/138) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000400), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000340)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/152, 0x98}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0, &(0x7f0000001040)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) [ 245.243754] audit: type=1326 audit(1536796921.253:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8856 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 00:02:01 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x16, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000b80)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="69705f06746901e100"}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000c40)={0x0, {{0x2, 0x0, @local}}}, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000280)={'veth1_to_bridge\x00'}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000c00), 0xfffffffffffffdea) seccomp(0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80), &(0x7f0000000dc0), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000ec0)='id_legacy\x00', &(0x7f0000000f00), &(0x7f0000000e80)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) setreuid(0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) 00:02:01 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000780)={{}, {}, [{}]}, 0x2c, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) [ 245.565505] ================================================================== [ 245.572943] BUG: KMSAN: kernel-infoleak in _copy_to_user+0x15d/0x1f0 [ 245.579461] CPU: 0 PID: 8865 Comm: syz-executor3 Not tainted 4.19.0-rc3+ #45 [ 245.586659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.596033] Call Trace: [ 245.598665] dump_stack+0x14b/0x190 [ 245.602364] kmsan_report+0x183/0x2b0 [ 245.606231] kmsan_internal_check_memory+0xfe/0x1f0 [ 245.611284] kmsan_copy_to_user+0x73/0xb0 [ 245.615483] _copy_to_user+0x15d/0x1f0 [ 245.619425] copy_siginfo_to_user+0x81/0x130 [ 245.623903] ptrace_request+0x2278/0x2680 [ 245.628092] ? __msan_poison_alloca+0x173/0x1f0 [ 245.632803] ? _raw_spin_lock_irqsave+0x41/0xe0 [ 245.637612] ? wait_task_inactive+0x397/0x990 [ 245.642157] ? kmsan_set_origin_inline+0x6b/0x120 [ 245.647042] arch_ptrace+0xbdd/0x11a0 [ 245.650872] ? ptrace_check_attach+0x182/0x5b0 [ 245.655485] __se_sys_ptrace+0x2a2/0x7e0 [ 245.659590] __x64_sys_ptrace+0x56/0x70 [ 245.663582] do_syscall_64+0xb8/0x100 [ 245.667406] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 245.672640] RIP: 0033:0x4572d9 [ 245.675856] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.694794] RSP: 002b:00007fc930ef6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000065 [ 245.702540] RAX: ffffffffffffffda RBX: 00007fc930ef76d4 RCX: 00000000004572d9 [ 245.709912] RDX: 0000000020000004 RSI: 0000000000000001 RDI: 0000000000004209 [ 245.717200] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 245.724487] R10: 0000000020000100 R11: 0000000000000246 R12: 00000000ffffffff [ 245.731772] R13: 00000000004d4478 R14: 00000000004c8d0b R15: 0000000000000000 [ 245.739083] [ 245.740725] Local variable description: ----kiov@ptrace_request [ 245.746784] Variable was created at: [ 245.750528] ptrace_request+0x19f/0x2680 [ 245.754607] arch_ptrace+0xbdd/0x11a0 [ 245.758412] [ 245.760048] Bytes 0-15 of 128 are uninitialized [ 245.764720] Memory access starts at ffff8801939efca0 [ 245.769827] ================================================================== [ 245.777196] Disabling lock debugging due to kernel taint [ 245.782657] Kernel panic - not syncing: panic_on_warn set ... [ 245.782657] [ 245.790060] CPU: 0 PID: 8865 Comm: syz-executor3 Tainted: G B 4.19.0-rc3+ #45 [ 245.798643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.808014] Call Trace: [ 245.810626] dump_stack+0x14b/0x190 [ 245.814285] panic+0x35d/0x8cb [ 245.817540] ? arch_ptrace+0xbdd/0x11a0 [ 245.821543] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 245.827034] kmsan_report+0x2a8/0x2b0 [ 245.830872] kmsan_internal_check_memory+0xfe/0x1f0 [ 245.835930] kmsan_copy_to_user+0x73/0xb0 [ 245.840109] _copy_to_user+0x15d/0x1f0 [ 245.844036] copy_siginfo_to_user+0x81/0x130 [ 245.848482] ptrace_request+0x2278/0x2680 [ 245.852658] ? __msan_poison_alloca+0x173/0x1f0 [ 245.857384] ? _raw_spin_lock_irqsave+0x41/0xe0 [ 245.862078] ? wait_task_inactive+0x397/0x990 [ 245.866615] ? kmsan_set_origin_inline+0x6b/0x120 [ 245.871514] arch_ptrace+0xbdd/0x11a0 [ 245.875352] ? ptrace_check_attach+0x182/0x5b0 [ 245.879975] __se_sys_ptrace+0x2a2/0x7e0 [ 245.884083] __x64_sys_ptrace+0x56/0x70 [ 245.888084] do_syscall_64+0xb8/0x100 [ 245.891908] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 245.897113] RIP: 0033:0x4572d9 [ 245.900335] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.919255] RSP: 002b:00007fc930ef6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000065 [ 245.926988] RAX: ffffffffffffffda RBX: 00007fc930ef76d4 RCX: 00000000004572d9 [ 245.934272] RDX: 0000000020000004 RSI: 0000000000000001 RDI: 0000000000004209 [ 245.941588] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 245.948873] R10: 0000000020000100 R11: 0000000000000246 R12: 00000000ffffffff [ 245.956154] R13: 00000000004d4478 R14: 00000000004c8d0b R15: 0000000000000000 [ 245.963756] Kernel Offset: disabled [ 245.967392] Rebooting in 86400 seconds..