x7f0000000980)) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000a00)={0x90}, 0x90) setresgid(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) syz_open_dev$sndpcmc(&(0x7f0000000640)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000600)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540), &(0x7f0000000580)=0x4) getgid() setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000007c0)={'filter\x00', 0x4}, 0x68) write$input_event(0xffffffffffffffff, &(0x7f0000000900), 0x18) getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xfffffffffffffff9) connect$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) 03:34:27 executing program 2: userfaultfd(0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000180)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in6=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000c00)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000020c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002100)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002140)={0x0, @local, @remote}, &(0x7f0000002180)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000002240)={@empty, @loopback}, &(0x7f0000002280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005880)={{{@in=@multicast1, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000005980)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000059c0)={'veth0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009900)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009cc0)={&(0x7f0000000140), 0xc, &(0x7f0000009c80)={&(0x7f0000009940)=ANY=[]}}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000480)={0x0, &(0x7f0000000440)}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000600)={0x0, &(0x7f00000004c0)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in=@remote, @in=@multicast1}}, {{@in=@broadcast}}}, &(0x7f0000000400)=0xe8) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:27 executing program 4: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) mknod(&(0x7f00007f2ff8)='./file0\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000380)) sendmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) open(&(0x7f00007ddff8)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0), &(0x7f0000000840)=0x4) ioctl$KDGKBLED(0xffffffffffffffff, 0xc0189436, &(0x7f0000000fff)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)) lchown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getegid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) 03:34:27 executing program 1: umount2(&(0x7f0000000200)='./file0\x00', 0x11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) eventfd(0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) getpriority(0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) socket$nl_route(0x10, 0x3, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000900)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:27 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0xfffffec7) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000068c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006900)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000006940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006980)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006f00)={@loopback}, &(0x7f0000006f40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006f80)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006fc0)={'ip6gretap0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000007000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ed40)={0x0, @remote}, &(0x7f000000ed80)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000edc0)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ee00)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f400)={&(0x7f0000000300), 0xc, &(0x7f000000f3c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0x0) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000e00)}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f00000005c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f00000003c0)=0xffffffffffffffae) getgid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:28 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xfffffffd) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000540)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/ppp\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000bc0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000c00)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) getresuid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000a00)={0x90}, 0x90) setresgid(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) syz_open_dev$sndpcmc(&(0x7f0000000640)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000600)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540), &(0x7f0000000580)=0x4) getgid() setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000007c0)={'filter\x00', 0x4}, 0x68) write$input_event(0xffffffffffffffff, &(0x7f0000000900), 0x18) getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xfffffffffffffff9) connect$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) 03:34:28 executing program 5: userfaultfd(0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000180)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in6=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000c00)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000020c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002100)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002140)={0x0, @local, @remote}, &(0x7f0000002180)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000002240)={@empty, @loopback}, &(0x7f0000002280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005880)={{{@in=@multicast1, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000005980)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000059c0)={'veth0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009900)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009cc0)={&(0x7f0000000140), 0xc, &(0x7f0000009c80)={&(0x7f0000009940)=ANY=[]}}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000480)={0x0, &(0x7f0000000440)}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000600)={0x0, &(0x7f00000004c0)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in=@remote, @in=@multicast1}}, {{@in=@broadcast}}}, &(0x7f0000000400)=0xe8) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:28 executing program 2: userfaultfd(0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000180)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in6=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000c00)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000020c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002100)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002140)={0x0, @local, @remote}, &(0x7f0000002180)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000002240)={@empty, @loopback}, &(0x7f0000002280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005880)={{{@in=@multicast1, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000005980)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000059c0)={'veth0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009900)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009cc0)={&(0x7f0000000140), 0xc, &(0x7f0000009c80)={&(0x7f0000009940)=ANY=[]}}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000480)={0x0, &(0x7f0000000440)}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000600)={0x0, &(0x7f00000004c0)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in=@remote, @in=@multicast1}}, {{@in=@broadcast}}}, &(0x7f0000000400)=0xe8) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:28 executing program 4: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) mknod(&(0x7f00007f2ff8)='./file0\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000380)) sendmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) open(&(0x7f00007ddff8)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0), &(0x7f0000000840)=0x4) ioctl$KDGKBLED(0xffffffffffffffff, 0xc0189436, &(0x7f0000000fff)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)) lchown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getegid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) 03:34:28 executing program 1: umount2(&(0x7f0000000200)='./file0\x00', 0x11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) eventfd(0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) getpriority(0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) socket$nl_route(0x10, 0x3, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000900)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:28 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0xfffffec7) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000068c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006900)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000006940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006980)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006f00)={@loopback}, &(0x7f0000006f40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006f80)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006fc0)={'ip6gretap0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000007000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ed40)={0x0, @remote}, &(0x7f000000ed80)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000edc0)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ee00)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f400)={&(0x7f0000000300), 0xc, &(0x7f000000f3c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0x0) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000e00)}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f00000005c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f00000003c0)=0xffffffffffffffae) getgid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:28 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xfffffffd) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000540)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/ppp\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000bc0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000c00)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) getresuid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000a00)={0x90}, 0x90) setresgid(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) syz_open_dev$sndpcmc(&(0x7f0000000640)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000600)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540), &(0x7f0000000580)=0x4) getgid() setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000007c0)={'filter\x00', 0x4}, 0x68) write$input_event(0xffffffffffffffff, &(0x7f0000000900), 0x18) getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xfffffffffffffff9) connect$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) 03:34:29 executing program 5: userfaultfd(0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000180)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in6=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000c00)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000020c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002100)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002140)={0x0, @local, @remote}, &(0x7f0000002180)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000002240)={@empty, @loopback}, &(0x7f0000002280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005880)={{{@in=@multicast1, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000005980)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000059c0)={'veth0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009900)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009cc0)={&(0x7f0000000140), 0xc, &(0x7f0000009c80)={&(0x7f0000009940)=ANY=[]}}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000480)={0x0, &(0x7f0000000440)}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000600)={0x0, &(0x7f00000004c0)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in=@remote, @in=@multicast1}}, {{@in=@broadcast}}}, &(0x7f0000000400)=0xe8) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:29 executing program 2: userfaultfd(0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000180)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in6=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000c00)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000020c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002100)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002140)={0x0, @local, @remote}, &(0x7f0000002180)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000002240)={@empty, @loopback}, &(0x7f0000002280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005880)={{{@in=@multicast1, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000005980)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000059c0)={'veth0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009900)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009cc0)={&(0x7f0000000140), 0xc, &(0x7f0000009c80)={&(0x7f0000009940)=ANY=[]}}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000480)={0x0, &(0x7f0000000440)}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000600)={0x0, &(0x7f00000004c0)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in=@remote, @in=@multicast1}}, {{@in=@broadcast}}}, &(0x7f0000000400)=0xe8) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:29 executing program 4: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) mknod(&(0x7f00007f2ff8)='./file0\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000380)) sendmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) open(&(0x7f00007ddff8)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0), &(0x7f0000000840)=0x4) ioctl$KDGKBLED(0xffffffffffffffff, 0xc0189436, &(0x7f0000000fff)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)) lchown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getegid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) 03:34:29 executing program 1: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0xfffffec7) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000068c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006900)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000006940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006980)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006f00)={@loopback}, &(0x7f0000006f40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006f80)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006fc0)={'ip6gretap0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000007000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ed40)={0x0, @remote}, &(0x7f000000ed80)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000edc0)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ee00)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f400)={&(0x7f0000000300), 0xc, &(0x7f000000f3c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0x0) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000e00)}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f00000005c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f00000003c0)=0xffffffffffffffae) getgid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:29 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0xfffffec7) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000068c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006900)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000006940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006980)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006f00)={@loopback}, &(0x7f0000006f40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006f80)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006fc0)={'ip6gretap0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000007000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ed40)={0x0, @remote}, &(0x7f000000ed80)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000edc0)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ee00)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f400)={&(0x7f0000000300), 0xc, &(0x7f000000f3c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0x0) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000e00)}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f00000005c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f00000003c0)=0xffffffffffffffae) getgid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0xfffffec7) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000068c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006900)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000006940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006980)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006f00)={@loopback}, &(0x7f0000006f40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006f80)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006fc0)={'ip6gretap0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000007000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ed40)={0x0, @remote}, &(0x7f000000ed80)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000edc0)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ee00)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f400)={&(0x7f0000000300), 0xc, &(0x7f000000f3c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0x0) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000e00)}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f00000005c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f00000003c0)=0xffffffffffffffae) getgid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x3b4, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000000209070000fffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 613.732112] nla_parse: 37 callbacks suppressed [ 613.732126] netlink: 5 bytes leftover after parsing attributes in process `syz-executor5'. 03:34:30 executing program 2: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x3b4, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000000209070000fffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 03:34:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x3b4, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000000209070000fffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 03:34:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0xfffffec7) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000068c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006900)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000006940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006980)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006f00)={@loopback}, &(0x7f0000006f40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006f80)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006fc0)={'ip6gretap0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000007000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ed40)={0x0, @remote}, &(0x7f000000ed80)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000edc0)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ee00)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f400)={&(0x7f0000000300), 0xc, &(0x7f000000f3c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0x0) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000e00)}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f00000005c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f00000003c0)=0xffffffffffffffae) getgid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 614.003405] netlink: 5 bytes leftover after parsing attributes in process `syz-executor5'. 03:34:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x3b4, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000000209070000fffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 614.045184] netlink: 5 bytes leftover after parsing attributes in process `syz-executor4'. 03:34:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x3b4, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000000209070000fffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 614.170487] netlink: 5 bytes leftover after parsing attributes in process `syz-executor5'. [ 614.203539] netlink: 5 bytes leftover after parsing attributes in process `syz-executor4'. 03:34:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x3b4, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000000209070000fffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 03:34:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x3b4, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000000209070000fffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 03:34:30 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0xfffffec7) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000068c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006900)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000006940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006980)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006f00)={@loopback}, &(0x7f0000006f40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006f80)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006fc0)={'ip6gretap0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000007000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ed40)={0x0, @remote}, &(0x7f000000ed80)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000edc0)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ee00)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f400)={&(0x7f0000000300), 0xc, &(0x7f000000f3c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0x0) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000e00)}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f00000005c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f00000003c0)=0xffffffffffffffae) getgid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 614.344889] netlink: 5 bytes leftover after parsing attributes in process `syz-executor5'. [ 614.401784] netlink: 5 bytes leftover after parsing attributes in process `syz-executor4'. 03:34:30 executing program 5: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000680)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000740)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000780), &(0x7f00000007c0)=0x8) clock_gettime(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:34:30 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0xfffffec7) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000068c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006900)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000006940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006980)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006f00)={@loopback}, &(0x7f0000006f40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006f80)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006fc0)={'ip6gretap0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000007000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ed40)={0x0, @remote}, &(0x7f000000ed80)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000edc0)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ee00)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f400)={&(0x7f0000000300), 0xc, &(0x7f000000f3c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0x0) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000e00)}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f00000005c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f00000003c0)=0xffffffffffffffae) getgid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:30 executing program 4: keyctl$set_reqkey_keyring(0x2, 0x0) add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x0, 0xfffffffffffffffa) keyctl$setperm(0xa, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) 03:34:31 executing program 2: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0xfffffec7) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000068c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006900)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000006940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006980)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006f00)={@loopback}, &(0x7f0000006f40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006f80)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006fc0)={'ip6gretap0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000007000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ed40)={0x0, @remote}, &(0x7f000000ed80)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000edc0)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ee00)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f400)={&(0x7f0000000300), 0xc, &(0x7f000000f3c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0x0) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000e00)}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f00000005c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f00000003c0)=0xffffffffffffffae) getgid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:31 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0xfffffec7) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000068c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006900)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000006940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006980)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006f00)={@loopback}, &(0x7f0000006f40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006f80)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006fc0)={'ip6gretap0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000007000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ed40)={0x0, @remote}, &(0x7f000000ed80)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000edc0)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ee00)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f400)={&(0x7f0000000300), 0xc, &(0x7f000000f3c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0x0) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000e00)}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f00000005c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f00000003c0)=0xffffffffffffffae) getgid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0xfffffec7) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000068c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006900)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000006940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006980)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006f00)={@loopback}, &(0x7f0000006f40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006f80)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006fc0)={'ip6gretap0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000007000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ed40)={0x0, @remote}, &(0x7f000000ed80)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000edc0)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ee00)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f400)={&(0x7f0000000300), 0xc, &(0x7f000000f3c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0x0) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000e00)}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f00000005c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f00000003c0)=0xffffffffffffffae) getgid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:31 executing program 5: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000680)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000740)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000780), &(0x7f00000007c0)=0x8) clock_gettime(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:34:31 executing program 4: keyctl$set_reqkey_keyring(0x2, 0x0) add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x0, 0xfffffffffffffffa) keyctl$setperm(0xa, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) 03:34:32 executing program 1: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:32 executing program 2: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:32 executing program 3: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:32 executing program 5: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000680)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000740)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000780), &(0x7f00000007c0)=0x8) clock_gettime(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:34:32 executing program 0: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:32 executing program 4: keyctl$set_reqkey_keyring(0x2, 0x0) add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x0, 0xfffffffffffffffa) keyctl$setperm(0xa, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) 03:34:33 executing program 1: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:33 executing program 2: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:33 executing program 3: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:33 executing program 0: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:33 executing program 5: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000680)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000740)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000780), &(0x7f00000007c0)=0x8) clock_gettime(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:34:33 executing program 4: keyctl$set_reqkey_keyring(0x2, 0x0) add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x0, 0xfffffffffffffffa) keyctl$setperm(0xa, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) 03:34:33 executing program 1: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:33 executing program 2: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:34 executing program 3: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:34 executing program 0: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:34 executing program 5: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:34 executing program 1: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:34 executing program 2: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:34 executing program 4: add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:34:35 executing program 4: add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:34:35 executing program 3: keyctl$setperm(0x10, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 03:34:35 executing program 4: add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:34:35 executing program 0: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:35 executing program 5: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:35 executing program 4: add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:34:35 executing program 1: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:35 executing program 2: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 03:34:36 executing program 3: keyctl$setperm(0x10, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 03:34:36 executing program 0: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:36 executing program 5: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:36 executing program 1: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)) rt_sigpending(&(0x7f00000000c0), 0x8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0xfffffffffffffffd) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000001480), 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) 03:34:36 executing program 2: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 03:34:37 executing program 3: keyctl$setperm(0x10, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 03:34:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 03:34:37 executing program 0: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:37 executing program 3: keyctl$setperm(0x10, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 03:34:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 03:34:38 executing program 2: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 03:34:38 executing program 0: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 03:34:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 03:34:39 executing program 2: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 03:34:39 executing program 0: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 03:34:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 03:34:40 executing program 2: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 03:34:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 03:34:40 executing program 0: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 03:34:41 executing program 2: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:41 executing program 4: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:42 executing program 0: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:42 executing program 5: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:42 executing program 1: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0x541b, &(0x7f0000000040)) 03:34:42 executing program 1: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0x541b, &(0x7f0000000040)) 03:34:42 executing program 1: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0x541b, &(0x7f0000000040)) 03:34:42 executing program 2: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:42 executing program 1: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0x541b, &(0x7f0000000040)) 03:34:43 executing program 4: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:43 executing program 1: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0x541b, &(0x7f0000000040)) 03:34:43 executing program 5: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:43 executing program 1: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0x541b, &(0x7f0000000040)) 03:34:43 executing program 0: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:43 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:43 executing program 1: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0x541b, &(0x7f0000000040)) 03:34:43 executing program 0: mlock2(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000240)=0x10, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000280)) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000840)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f00000058c0), 0x0, 0x0, &(0x7f0000005a40)) getsockname$packet(0xffffffffffffffff, &(0x7f0000005a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005ac0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005b40)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b80)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}}}, &(0x7f0000005c80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005d00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007280)={{{@in=@multicast1, @in6=@ipv4={[], [], @remote}}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000007380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000073c0)={@loopback}, &(0x7f0000007400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007440)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'ip6tnl0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007580)={{{@in=@multicast2, @in6=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000007680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007700)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000007800)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007840)={'syzkaller0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007880)={0x0, @empty, @dev}, &(0x7f00000078c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007a40)={@mcast1}, &(0x7f0000007a80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007b00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007d80)={@remote}, &(0x7f0000007dc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007e00)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007e40)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000007f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008040)={{{@in6=@dev, @in6}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000008140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008180)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000081c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f00000082c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000008b80)={&(0x7f0000000440), 0xc, &(0x7f0000008b40)={&(0x7f0000008300)=ANY=[]}}, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7d0dc56fc059d582580a4f1ba724b603f486e93919708bef7894305d5fa424fb32a3b745ef584a9956014edfbbf6fac4fb4e4a0aaa23dac0b82527ee7b285656", "c91af8996130b3c74a0ef950835ea68acce245873a3eccde5e389809ad58490c"}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffd000/0x3000)=nil) accept(0xffffffffffffffff, &(0x7f0000000300)=@rc, &(0x7f0000000380)=0x80) 03:34:43 executing program 1: keyctl$set_reqkey_keyring(0x2, 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000440)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000480)) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f00000001c0)={0x77359400}, 0x10) msgget$private(0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000140)=ANY=[], &(0x7f00000000c0)) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000500)={0x2, 0x0, @remote}, &(0x7f0000000580)=0x10) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000004c0)) clone(0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) syz_execute_func(&(0x7f0000000040)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000280), &(0x7f0000000340)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380), &(0x7f00000003c0)=0x8) syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 03:34:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='\'\x00'}, 0x10) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18) getgid() syz_execute_func(&(0x7f00000024c0)="428055a0c66969ef69dc00d99038e339392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") accept(0xffffffffffffffff, &(0x7f0000002280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000002300)=0x80) utimensat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', &(0x7f0000002380)={{0x0, 0x2710}}, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002140), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'}) 03:34:43 executing program 5: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:44 executing program 4: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="a9137558da8f514c41b5b768eace2b68870515d32d95fe74bb5d41452731acc242a46463f20b7cbaf16568584bfbd863c8b05078a6d4085796d681d224767bef05c7c3c71f84b4f2f9e0c1c30581475ad74d6c9c3b7f380d41b878086c252ef1db11f1f0067c0869c680e25df8370b112c1bf9318bbf24fb5a030934ed2b511a1bda0000000000"], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fstat(r0, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) setpriority(0x2, r2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x0, 0x2}}, 0x20) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:34:44 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:44 executing program 0: mlock2(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000240)=0x10, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000280)) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000840)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f00000058c0), 0x0, 0x0, &(0x7f0000005a40)) getsockname$packet(0xffffffffffffffff, &(0x7f0000005a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005ac0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005b40)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b80)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}}}, &(0x7f0000005c80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005d00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007280)={{{@in=@multicast1, @in6=@ipv4={[], [], @remote}}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000007380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000073c0)={@loopback}, &(0x7f0000007400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007440)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'ip6tnl0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007580)={{{@in=@multicast2, @in6=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000007680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007700)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000007800)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007840)={'syzkaller0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007880)={0x0, @empty, @dev}, &(0x7f00000078c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007a40)={@mcast1}, &(0x7f0000007a80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007b00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007d80)={@remote}, &(0x7f0000007dc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007e00)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007e40)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000007f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008040)={{{@in6=@dev, @in6}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000008140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008180)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000081c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f00000082c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000008b80)={&(0x7f0000000440), 0xc, &(0x7f0000008b40)={&(0x7f0000008300)=ANY=[]}}, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7d0dc56fc059d582580a4f1ba724b603f486e93919708bef7894305d5fa424fb32a3b745ef584a9956014edfbbf6fac4fb4e4a0aaa23dac0b82527ee7b285656", "c91af8996130b3c74a0ef950835ea68acce245873a3eccde5e389809ad58490c"}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffd000/0x3000)=nil) accept(0xffffffffffffffff, &(0x7f0000000300)=@rc, &(0x7f0000000380)=0x80) 03:34:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='\'\x00'}, 0x10) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18) getgid() syz_execute_func(&(0x7f00000024c0)="428055a0c66969ef69dc00d99038e339392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") accept(0xffffffffffffffff, &(0x7f0000002280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000002300)=0x80) utimensat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', &(0x7f0000002380)={{0x0, 0x2710}}, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002140), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'}) 03:34:45 executing program 1: keyctl$set_reqkey_keyring(0x2, 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000440)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000480)) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f00000001c0)={0x77359400}, 0x10) msgget$private(0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000140)=ANY=[], &(0x7f00000000c0)) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000500)={0x2, 0x0, @remote}, &(0x7f0000000580)=0x10) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000004c0)) clone(0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) syz_execute_func(&(0x7f0000000040)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000280), &(0x7f0000000340)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380), &(0x7f00000003c0)=0x8) syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 03:34:45 executing program 5: mlock2(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000240)=0x10, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000280)) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000840)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f00000058c0), 0x0, 0x0, &(0x7f0000005a40)) getsockname$packet(0xffffffffffffffff, &(0x7f0000005a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005ac0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005b40)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b80)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}}}, &(0x7f0000005c80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005d00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007280)={{{@in=@multicast1, @in6=@ipv4={[], [], @remote}}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000007380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000073c0)={@loopback}, &(0x7f0000007400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007440)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'ip6tnl0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007580)={{{@in=@multicast2, @in6=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000007680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007700)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000007800)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007840)={'syzkaller0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007880)={0x0, @empty, @dev}, &(0x7f00000078c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007a40)={@mcast1}, &(0x7f0000007a80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007b00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007d80)={@remote}, &(0x7f0000007dc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007e00)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007e40)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000007f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008040)={{{@in6=@dev, @in6}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000008140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008180)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000081c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f00000082c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000008b80)={&(0x7f0000000440), 0xc, &(0x7f0000008b40)={&(0x7f0000008300)=ANY=[]}}, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7d0dc56fc059d582580a4f1ba724b603f486e93919708bef7894305d5fa424fb32a3b745ef584a9956014edfbbf6fac4fb4e4a0aaa23dac0b82527ee7b285656", "c91af8996130b3c74a0ef950835ea68acce245873a3eccde5e389809ad58490c"}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffd000/0x3000)=nil) accept(0xffffffffffffffff, &(0x7f0000000300)=@rc, &(0x7f0000000380)=0x80) 03:34:45 executing program 4: epoll_create1(0x0) signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x7, 0x0) unshare(0x0) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) socket$alg(0x26, 0x5, 0x0) socket(0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000d80)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000880)=0xfe) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getpeername(0xffffffffffffffff, &(0x7f0000000480)=@xdp, &(0x7f0000000280)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={@dev}, &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6=@dev, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000740)={0x0, @loopback, @local}, &(0x7f0000000780)=0xc) fremovexattr(0xffffffffffffffff, &(0x7f0000000400)=ANY=[]) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000800)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'ip6_vti0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000980)={@dev, @rand_addr}, &(0x7f00000009c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000340)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b00)=0x3da) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000007c0)=0xe8) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) 03:34:45 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:45 executing program 0: mlock2(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000240)=0x10, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000280)) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000840)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f00000058c0), 0x0, 0x0, &(0x7f0000005a40)) getsockname$packet(0xffffffffffffffff, &(0x7f0000005a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005ac0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005b40)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b80)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}}}, &(0x7f0000005c80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005d00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007280)={{{@in=@multicast1, @in6=@ipv4={[], [], @remote}}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000007380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000073c0)={@loopback}, &(0x7f0000007400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007440)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'ip6tnl0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007580)={{{@in=@multicast2, @in6=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000007680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007700)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000007800)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007840)={'syzkaller0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007880)={0x0, @empty, @dev}, &(0x7f00000078c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007a40)={@mcast1}, &(0x7f0000007a80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007b00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007d80)={@remote}, &(0x7f0000007dc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007e00)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007e40)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000007f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008040)={{{@in6=@dev, @in6}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000008140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008180)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000081c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f00000082c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000008b80)={&(0x7f0000000440), 0xc, &(0x7f0000008b40)={&(0x7f0000008300)=ANY=[]}}, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7d0dc56fc059d582580a4f1ba724b603f486e93919708bef7894305d5fa424fb32a3b745ef584a9956014edfbbf6fac4fb4e4a0aaa23dac0b82527ee7b285656", "c91af8996130b3c74a0ef950835ea68acce245873a3eccde5e389809ad58490c"}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffd000/0x3000)=nil) accept(0xffffffffffffffff, &(0x7f0000000300)=@rc, &(0x7f0000000380)=0x80) 03:34:45 executing program 5: mlock2(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000240)=0x10, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000280)) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000840)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f00000058c0), 0x0, 0x0, &(0x7f0000005a40)) getsockname$packet(0xffffffffffffffff, &(0x7f0000005a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005ac0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005b40)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b80)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}}}, &(0x7f0000005c80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005d00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007280)={{{@in=@multicast1, @in6=@ipv4={[], [], @remote}}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000007380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000073c0)={@loopback}, &(0x7f0000007400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007440)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'ip6tnl0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007580)={{{@in=@multicast2, @in6=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000007680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007700)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000007800)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007840)={'syzkaller0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007880)={0x0, @empty, @dev}, &(0x7f00000078c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007a40)={@mcast1}, &(0x7f0000007a80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007b00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007d80)={@remote}, &(0x7f0000007dc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007e00)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007e40)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000007f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008040)={{{@in6=@dev, @in6}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000008140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008180)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000081c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f00000082c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000008b80)={&(0x7f0000000440), 0xc, &(0x7f0000008b40)={&(0x7f0000008300)=ANY=[]}}, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7d0dc56fc059d582580a4f1ba724b603f486e93919708bef7894305d5fa424fb32a3b745ef584a9956014edfbbf6fac4fb4e4a0aaa23dac0b82527ee7b285656", "c91af8996130b3c74a0ef950835ea68acce245873a3eccde5e389809ad58490c"}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffd000/0x3000)=nil) accept(0xffffffffffffffff, &(0x7f0000000300)=@rc, &(0x7f0000000380)=0x80) 03:34:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='\'\x00'}, 0x10) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18) getgid() syz_execute_func(&(0x7f00000024c0)="428055a0c66969ef69dc00d99038e339392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") accept(0xffffffffffffffff, &(0x7f0000002280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000002300)=0x80) utimensat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', &(0x7f0000002380)={{0x0, 0x2710}}, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002140), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'}) 03:34:46 executing program 1: keyctl$set_reqkey_keyring(0x2, 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000440)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000480)) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f00000001c0)={0x77359400}, 0x10) msgget$private(0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000140)=ANY=[], &(0x7f00000000c0)) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000500)={0x2, 0x0, @remote}, &(0x7f0000000580)=0x10) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000004c0)) clone(0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) syz_execute_func(&(0x7f0000000040)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000280), &(0x7f0000000340)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380), &(0x7f00000003c0)=0x8) syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 03:34:46 executing program 4: epoll_create1(0x0) signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x7, 0x0) unshare(0x0) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) socket$alg(0x26, 0x5, 0x0) socket(0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000d80)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000880)=0xfe) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getpeername(0xffffffffffffffff, &(0x7f0000000480)=@xdp, &(0x7f0000000280)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={@dev}, &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6=@dev, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000740)={0x0, @loopback, @local}, &(0x7f0000000780)=0xc) fremovexattr(0xffffffffffffffff, &(0x7f0000000400)=ANY=[]) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000800)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'ip6_vti0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000980)={@dev, @rand_addr}, &(0x7f00000009c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000340)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b00)=0x3da) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000007c0)=0xe8) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) 03:34:46 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:46 executing program 0: mlock2(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000240)=0x10, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000280)) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000840)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f00000058c0), 0x0, 0x0, &(0x7f0000005a40)) getsockname$packet(0xffffffffffffffff, &(0x7f0000005a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005ac0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005b40)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b80)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}}}, &(0x7f0000005c80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005d00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007280)={{{@in=@multicast1, @in6=@ipv4={[], [], @remote}}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000007380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000073c0)={@loopback}, &(0x7f0000007400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007440)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'ip6tnl0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007580)={{{@in=@multicast2, @in6=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000007680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007700)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000007800)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007840)={'syzkaller0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007880)={0x0, @empty, @dev}, &(0x7f00000078c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007a40)={@mcast1}, &(0x7f0000007a80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007b00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007d80)={@remote}, &(0x7f0000007dc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007e00)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007e40)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000007f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008040)={{{@in6=@dev, @in6}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000008140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008180)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000081c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f00000082c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000008b80)={&(0x7f0000000440), 0xc, &(0x7f0000008b40)={&(0x7f0000008300)=ANY=[]}}, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7d0dc56fc059d582580a4f1ba724b603f486e93919708bef7894305d5fa424fb32a3b745ef584a9956014edfbbf6fac4fb4e4a0aaa23dac0b82527ee7b285656", "c91af8996130b3c74a0ef950835ea68acce245873a3eccde5e389809ad58490c"}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffd000/0x3000)=nil) accept(0xffffffffffffffff, &(0x7f0000000300)=@rc, &(0x7f0000000380)=0x80) 03:34:46 executing program 5: mlock2(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000240)=0x10, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000280)) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000840)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f00000058c0), 0x0, 0x0, &(0x7f0000005a40)) getsockname$packet(0xffffffffffffffff, &(0x7f0000005a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005ac0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005b40)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b80)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}}}, &(0x7f0000005c80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005d00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007280)={{{@in=@multicast1, @in6=@ipv4={[], [], @remote}}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000007380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000073c0)={@loopback}, &(0x7f0000007400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007440)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'ip6tnl0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007580)={{{@in=@multicast2, @in6=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000007680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007700)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000007800)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007840)={'syzkaller0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007880)={0x0, @empty, @dev}, &(0x7f00000078c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007a40)={@mcast1}, &(0x7f0000007a80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007b00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007d80)={@remote}, &(0x7f0000007dc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007e00)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007e40)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000007f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008040)={{{@in6=@dev, @in6}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000008140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008180)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000081c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f00000082c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000008b80)={&(0x7f0000000440), 0xc, &(0x7f0000008b40)={&(0x7f0000008300)=ANY=[]}}, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7d0dc56fc059d582580a4f1ba724b603f486e93919708bef7894305d5fa424fb32a3b745ef584a9956014edfbbf6fac4fb4e4a0aaa23dac0b82527ee7b285656", "c91af8996130b3c74a0ef950835ea68acce245873a3eccde5e389809ad58490c"}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffd000/0x3000)=nil) accept(0xffffffffffffffff, &(0x7f0000000300)=@rc, &(0x7f0000000380)=0x80) 03:34:46 executing program 4: epoll_create1(0x0) signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x7, 0x0) unshare(0x0) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) socket$alg(0x26, 0x5, 0x0) socket(0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000d80)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000880)=0xfe) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getpeername(0xffffffffffffffff, &(0x7f0000000480)=@xdp, &(0x7f0000000280)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={@dev}, &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6=@dev, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000740)={0x0, @loopback, @local}, &(0x7f0000000780)=0xc) fremovexattr(0xffffffffffffffff, &(0x7f0000000400)=ANY=[]) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000800)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'ip6_vti0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000980)={@dev, @rand_addr}, &(0x7f00000009c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000340)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b00)=0x3da) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000007c0)=0xe8) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) 03:34:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='\'\x00'}, 0x10) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18) getgid() syz_execute_func(&(0x7f00000024c0)="428055a0c66969ef69dc00d99038e339392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") accept(0xffffffffffffffff, &(0x7f0000002280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000002300)=0x80) utimensat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', &(0x7f0000002380)={{0x0, 0x2710}}, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002140), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'}) 03:34:47 executing program 3: keyctl$set_reqkey_keyring(0x4, 0xfffffffe) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000500)='cgroup.threads\x00', 0x2, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000300)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x7530}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) arch_prctl(0x0, &(0x7f0000000540)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000001880)=""/88) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000001740)) lstat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) fchownat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000440)) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000001900)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) prctl$setmm(0x23, 0x0, &(0x7f0000ffc000/0x3000)=nil) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000340), &(0x7f0000000400)=0xc) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0x100e04, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:47 executing program 1: keyctl$set_reqkey_keyring(0x2, 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000440)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000480)) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f00000001c0)={0x77359400}, 0x10) msgget$private(0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000140)=ANY=[], &(0x7f00000000c0)) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000500)={0x2, 0x0, @remote}, &(0x7f0000000580)=0x10) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000004c0)) clone(0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) syz_execute_func(&(0x7f0000000040)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000280), &(0x7f0000000340)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380), &(0x7f00000003c0)=0x8) syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 03:34:47 executing program 0: unshare(0xfffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000280)=""/243) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f00000001c0)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540), 0xc) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=@random={'user.', 'system.sockprotoname\x00'}, &(0x7f00000003c0)=""/255, 0xf0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000180)=@req3, 0x1c) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)) mq_notify(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000001140)}}) 03:34:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={"768774390000000000000000bd6800", 0x5}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={"c1eb00000000000200", 0x400}) 03:34:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={"768774390000000000000000bd6800", 0x5}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={"c1eb00000000000200", 0x400}) 03:34:47 executing program 4: epoll_create1(0x0) signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x7, 0x0) unshare(0x0) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) socket$alg(0x26, 0x5, 0x0) socket(0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000d80)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000880)=0xfe) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getpeername(0xffffffffffffffff, &(0x7f0000000480)=@xdp, &(0x7f0000000280)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={@dev}, &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6=@dev, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000740)={0x0, @loopback, @local}, &(0x7f0000000780)=0xc) fremovexattr(0xffffffffffffffff, &(0x7f0000000400)=ANY=[]) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000800)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'ip6_vti0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000980)={@dev, @rand_addr}, &(0x7f00000009c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000340)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b00)=0x3da) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000007c0)=0xe8) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) 03:34:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={"768774390000000000000000bd6800", 0x5}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={"c1eb00000000000200", 0x400}) 03:34:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={"768774390000000000000000bd6800", 0x5}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={"c1eb00000000000200", 0x400}) 03:34:48 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={"768774390000000000000000bd6800", 0x5}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={"c1eb00000000000200", 0x400}) 03:34:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={"768774390000000000000000bd6800", 0x5}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={"c1eb00000000000200", 0x400}) 03:34:48 executing program 0: unshare(0xfffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000280)=""/243) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f00000001c0)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540), 0xc) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=@random={'user.', 'system.sockprotoname\x00'}, &(0x7f00000003c0)=""/255, 0xf0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000180)=@req3, 0x1c) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)) mq_notify(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000001140)}}) 03:34:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={"768774390000000000000000bd6800", 0x5}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={"c1eb00000000000200", 0x400}) 03:34:48 executing program 3: keyctl$set_reqkey_keyring(0x4, 0xfffffffe) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000500)='cgroup.threads\x00', 0x2, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000300)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x7530}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) arch_prctl(0x0, &(0x7f0000000540)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000001880)=""/88) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000001740)) lstat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) fchownat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000440)) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000001900)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) prctl$setmm(0x23, 0x0, &(0x7f0000ffc000/0x3000)=nil) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000340), &(0x7f0000000400)=0xc) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0x100e04, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={"768774390000000000000000bd6800", 0x5}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={"c1eb00000000000200", 0x400}) 03:34:48 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={"768774390000000000000000bd6800", 0x5}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={"c1eb00000000000200", 0x400}) 03:34:48 executing program 5: unshare(0xfffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000280)=""/243) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f00000001c0)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540), 0xc) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=@random={'user.', 'system.sockprotoname\x00'}, &(0x7f00000003c0)=""/255, 0xf0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000180)=@req3, 0x1c) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)) mq_notify(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000001140)}}) 03:34:48 executing program 4: unshare(0xfffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000280)=""/243) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f00000001c0)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540), 0xc) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=@random={'user.', 'system.sockprotoname\x00'}, &(0x7f00000003c0)=""/255, 0xf0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000180)=@req3, 0x1c) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)) mq_notify(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000001140)}}) 03:34:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={"768774390000000000000000bd6800", 0x5}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={"c1eb00000000000200", 0x400}) 03:34:49 executing program 2: unshare(0xfffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000280)=""/243) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f00000001c0)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540), 0xc) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=@random={'user.', 'system.sockprotoname\x00'}, &(0x7f00000003c0)=""/255, 0xf0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000180)=@req3, 0x1c) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)) mq_notify(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000001140)}}) 03:34:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), 0x14) 03:34:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), 0x14) 03:34:49 executing program 0: unshare(0xfffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000280)=""/243) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f00000001c0)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540), 0xc) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=@random={'user.', 'system.sockprotoname\x00'}, &(0x7f00000003c0)=""/255, 0xf0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000180)=@req3, 0x1c) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)) mq_notify(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000001140)}}) 03:34:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), 0x14) 03:34:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), 0x14) 03:34:49 executing program 3: keyctl$set_reqkey_keyring(0x4, 0xfffffffe) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000500)='cgroup.threads\x00', 0x2, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000300)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x7530}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) arch_prctl(0x0, &(0x7f0000000540)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000001880)=""/88) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000001740)) lstat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) fchownat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000440)) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000001900)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) prctl$setmm(0x23, 0x0, &(0x7f0000ffc000/0x3000)=nil) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000340), &(0x7f0000000400)=0xc) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0x100e04, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:49 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 03:34:49 executing program 5: unshare(0xfffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000280)=""/243) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f00000001c0)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540), 0xc) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=@random={'user.', 'system.sockprotoname\x00'}, &(0x7f00000003c0)=""/255, 0xf0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000180)=@req3, 0x1c) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)) mq_notify(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000001140)}}) 03:34:49 executing program 4: unshare(0xfffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000280)=""/243) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f00000001c0)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540), 0xc) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=@random={'user.', 'system.sockprotoname\x00'}, &(0x7f00000003c0)=""/255, 0xf0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000180)=@req3, 0x1c) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)) mq_notify(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000001140)}}) 03:34:49 executing program 2: unshare(0xfffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000280)=""/243) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f00000001c0)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540), 0xc) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=@random={'user.', 'system.sockprotoname\x00'}, &(0x7f00000003c0)=""/255, 0xf0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000180)=@req3, 0x1c) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)) mq_notify(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000001140)}}) [ 633.616831] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 03:34:49 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 633.764150] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 03:34:50 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 03:34:50 executing program 0: unshare(0xfffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000280)=""/243) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f00000001c0)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540), 0xc) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=@random={'user.', 'system.sockprotoname\x00'}, &(0x7f00000003c0)=""/255, 0xf0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000180)=@req3, 0x1c) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)) mq_notify(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000001140)}}) [ 633.980630] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 03:34:50 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 634.164196] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 03:34:50 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 634.322123] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 03:34:50 executing program 4: unshare(0xfffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000280)=""/243) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f00000001c0)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540), 0xc) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=@random={'user.', 'system.sockprotoname\x00'}, &(0x7f00000003c0)=""/255, 0xf0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000180)=@req3, 0x1c) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)) mq_notify(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000001140)}}) 03:34:50 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 634.519884] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 03:34:51 executing program 3: keyctl$set_reqkey_keyring(0x4, 0xfffffffe) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000500)='cgroup.threads\x00', 0x2, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000300)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x7530}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) arch_prctl(0x0, &(0x7f0000000540)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000001880)=""/88) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000001740)) lstat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) fchownat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000440)) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000001900)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) prctl$setmm(0x23, 0x0, &(0x7f0000ffc000/0x3000)=nil) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000340), &(0x7f0000000400)=0xc) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0x100e04, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:51 executing program 5: unshare(0xfffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000280)=""/243) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f00000001c0)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540), 0xc) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=@random={'user.', 'system.sockprotoname\x00'}, &(0x7f00000003c0)=""/255, 0xf0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000180)=@req3, 0x1c) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)) mq_notify(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000001140)}}) 03:34:51 executing program 2: unshare(0xfffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000280)=""/243) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f00000001c0)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540), 0xc) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=@random={'user.', 'system.sockprotoname\x00'}, &(0x7f00000003c0)=""/255, 0xf0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000180)=@req3, 0x1c) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)) mq_notify(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000001140)}}) 03:34:51 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 03:34:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000180)=@newae={0x5c, 0x1e, 0x1, 0x0, 0x0, {{@in=@rand_addr}}, [@replay_esn_val={0x1c}]}, 0x5c}}, 0x0) 03:34:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000180)=@newae={0x5c, 0x1e, 0x1, 0x0, 0x0, {{@in=@rand_addr}}, [@replay_esn_val={0x1c}]}, 0x5c}}, 0x0) [ 634.958714] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 03:34:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000180)=@newae={0x5c, 0x1e, 0x1, 0x0, 0x0, {{@in=@rand_addr}}, [@replay_esn_val={0x1c}]}, 0x5c}}, 0x0) 03:34:51 executing program 1: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) io_setup(0x0, &(0x7f0000000640)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000680), &(0x7f00000006c0)={0x0, 0x1c9c380}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) socket$inet_icmp_raw(0x2, 0x3, 0x1) getrusage(0x0, &(0x7f0000000240)) request_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000480), &(0x7f00000004c0)='posix_acl_access+vboxnet1\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000ac0)="42805da012d0a02e0000000f01ee73fe19f86fa76fa738216526660fdf5d5cf081768cc80000003666460f383ffbc4a1796f7dfd6b217975450f2e1ac4010d64ac1e5d31a3b771ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000280)) 03:34:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000180)=@newae={0x5c, 0x1e, 0x1, 0x0, 0x0, {{@in=@rand_addr}}, [@replay_esn_val={0x1c}]}, 0x5c}}, 0x0) 03:34:51 executing program 0: mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ff7000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) userfaultfd(0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000540)=0xe8) prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000340)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") timerfd_create(0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000002c0)={'veth1_to_bridge\x00'}) syz_execute_func(&(0x7f0000000040)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") 03:34:51 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001180)=ANY=[], &(0x7f0000000f00)) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) creat(&(0x7f0000000cc0)='./file0\x00', 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000d00)=""/158, &(0x7f0000000dc0)=0x9e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000f40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) getuid() getresuid(&(0x7f0000000300), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x17, &(0x7f0000000880)=""/23, 0x12, &(0x7f0000000940)=""/18, 0x52, &(0x7f0000000980)=""/82}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getuid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000840)=ANY=[], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:52 executing program 5: epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000200)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:52 executing program 2: keyctl$set_reqkey_keyring(0x2, 0x5) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f0000000080)}) io_setup(0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f00000006c0), 0x0, 0x0, 0xfffffffffffffffa) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:52 executing program 0: mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ff7000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) userfaultfd(0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000540)=0xe8) prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000340)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") timerfd_create(0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000002c0)={'veth1_to_bridge\x00'}) syz_execute_func(&(0x7f0000000040)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") 03:34:52 executing program 1: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) io_setup(0x0, &(0x7f0000000640)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000680), &(0x7f00000006c0)={0x0, 0x1c9c380}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) socket$inet_icmp_raw(0x2, 0x3, 0x1) getrusage(0x0, &(0x7f0000000240)) request_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000480), &(0x7f00000004c0)='posix_acl_access+vboxnet1\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000ac0)="42805da012d0a02e0000000f01ee73fe19f86fa76fa738216526660fdf5d5cf081768cc80000003666460f383ffbc4a1796f7dfd6b217975450f2e1ac4010d64ac1e5d31a3b771ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000280)) 03:34:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/184, 0xb8}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000080)=""/58, 0x3a}], 0x3) 03:34:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/184, 0xb8}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000080)=""/58, 0x3a}], 0x3) 03:34:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/184, 0xb8}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000080)=""/58, 0x3a}], 0x3) 03:34:52 executing program 0: mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ff7000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) userfaultfd(0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000540)=0xe8) prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000340)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") timerfd_create(0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000002c0)={'veth1_to_bridge\x00'}) syz_execute_func(&(0x7f0000000040)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") 03:34:53 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001180)=ANY=[], &(0x7f0000000f00)) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) creat(&(0x7f0000000cc0)='./file0\x00', 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000d00)=""/158, &(0x7f0000000dc0)=0x9e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000f40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) getuid() getresuid(&(0x7f0000000300), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x17, &(0x7f0000000880)=""/23, 0x12, &(0x7f0000000940)=""/18, 0x52, &(0x7f0000000980)=""/82}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getuid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000840)=ANY=[], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/184, 0xb8}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000080)=""/58, 0x3a}], 0x3) 03:34:53 executing program 5: epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000200)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:53 executing program 3: openat$mixer(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001180)=ANY=[], &(0x7f0000000f00)) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) creat(&(0x7f0000000cc0)='./file0\x00', 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000d00)=""/158, &(0x7f0000000dc0)=0x9e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000f40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) getuid() getresuid(&(0x7f0000000300), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x17, &(0x7f0000000880)=""/23, 0x12, &(0x7f0000000940)=""/18, 0x52, &(0x7f0000000980)=""/82}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getuid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000840)=ANY=[], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:53 executing program 1: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) io_setup(0x0, &(0x7f0000000640)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000680), &(0x7f00000006c0)={0x0, 0x1c9c380}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) socket$inet_icmp_raw(0x2, 0x3, 0x1) getrusage(0x0, &(0x7f0000000240)) request_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000480), &(0x7f00000004c0)='posix_acl_access+vboxnet1\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000ac0)="42805da012d0a02e0000000f01ee73fe19f86fa76fa738216526660fdf5d5cf081768cc80000003666460f383ffbc4a1796f7dfd6b217975450f2e1ac4010d64ac1e5d31a3b771ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000280)) 03:34:53 executing program 2: keyctl$set_reqkey_keyring(0x2, 0x5) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f0000000080)}) io_setup(0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f00000006c0), 0x0, 0x0, 0xfffffffffffffffa) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:53 executing program 0: mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ff7000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) userfaultfd(0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000540)=0xe8) prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000340)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") timerfd_create(0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000002c0)={'veth1_to_bridge\x00'}) syz_execute_func(&(0x7f0000000040)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") 03:34:54 executing program 5: epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000200)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:54 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001180)=ANY=[], &(0x7f0000000f00)) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) creat(&(0x7f0000000cc0)='./file0\x00', 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000d00)=""/158, &(0x7f0000000dc0)=0x9e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000f40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) getuid() getresuid(&(0x7f0000000300), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x17, &(0x7f0000000880)=""/23, 0x12, &(0x7f0000000940)=""/18, 0x52, &(0x7f0000000980)=""/82}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getuid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000840)=ANY=[], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:54 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001180)=ANY=[], &(0x7f0000000f00)) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) creat(&(0x7f0000000cc0)='./file0\x00', 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000d00)=""/158, &(0x7f0000000dc0)=0x9e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000f40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) getuid() getresuid(&(0x7f0000000300), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x17, &(0x7f0000000880)=""/23, 0x12, &(0x7f0000000940)=""/18, 0x52, &(0x7f0000000980)=""/82}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getuid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000840)=ANY=[], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:54 executing program 3: openat$mixer(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001180)=ANY=[], &(0x7f0000000f00)) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) creat(&(0x7f0000000cc0)='./file0\x00', 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000d00)=""/158, &(0x7f0000000dc0)=0x9e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000f40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) getuid() getresuid(&(0x7f0000000300), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x17, &(0x7f0000000880)=""/23, 0x12, &(0x7f0000000940)=""/18, 0x52, &(0x7f0000000980)=""/82}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getuid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000840)=ANY=[], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:54 executing program 1: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) io_setup(0x0, &(0x7f0000000640)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000680), &(0x7f00000006c0)={0x0, 0x1c9c380}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) socket$inet_icmp_raw(0x2, 0x3, 0x1) getrusage(0x0, &(0x7f0000000240)) request_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000480), &(0x7f00000004c0)='posix_acl_access+vboxnet1\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000ac0)="42805da012d0a02e0000000f01ee73fe19f86fa76fa738216526660fdf5d5cf081768cc80000003666460f383ffbc4a1796f7dfd6b217975450f2e1ac4010d64ac1e5d31a3b771ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000280)) 03:34:54 executing program 2: keyctl$set_reqkey_keyring(0x2, 0x5) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f0000000080)}) io_setup(0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f00000006c0), 0x0, 0x0, 0xfffffffffffffffa) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:54 executing program 5: epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000200)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:55 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001180)=ANY=[], &(0x7f0000000f00)) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) creat(&(0x7f0000000cc0)='./file0\x00', 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000d00)=""/158, &(0x7f0000000dc0)=0x9e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000f40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) getuid() getresuid(&(0x7f0000000300), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x17, &(0x7f0000000880)=""/23, 0x12, &(0x7f0000000940)=""/18, 0x52, &(0x7f0000000980)=""/82}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getuid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000840)=ANY=[], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:55 executing program 3: openat$mixer(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001180)=ANY=[], &(0x7f0000000f00)) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) creat(&(0x7f0000000cc0)='./file0\x00', 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000d00)=""/158, &(0x7f0000000dc0)=0x9e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000f40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) getuid() getresuid(&(0x7f0000000300), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x17, &(0x7f0000000880)=""/23, 0x12, &(0x7f0000000940)=""/18, 0x52, &(0x7f0000000980)=""/82}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getuid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000840)=ANY=[], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:55 executing program 2: keyctl$set_reqkey_keyring(0x2, 0x5) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f0000000080)}) io_setup(0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f00000006c0), 0x0, 0x0, 0xfffffffffffffffa) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/184, 0xb8}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000080)=""/58, 0x3a}], 0x3) 03:34:55 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001180)=ANY=[], &(0x7f0000000f00)) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) creat(&(0x7f0000000cc0)='./file0\x00', 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000d00)=""/158, &(0x7f0000000dc0)=0x9e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000f40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) getuid() getresuid(&(0x7f0000000300), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x17, &(0x7f0000000880)=""/23, 0x12, &(0x7f0000000940)=""/18, 0x52, &(0x7f0000000980)=""/82}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getuid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000840)=ANY=[], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/184, 0xb8}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000080)=""/58, 0x3a}], 0x3) 03:34:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/184, 0xb8}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000080)=""/58, 0x3a}], 0x3) 03:34:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0xe, &(0x7f0000000140), 0x12f) 03:34:55 executing program 1: nanosleep(&(0x7f0000000040), 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180), 0x10) eventfd(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80), 0x0, 0x0, &(0x7f0000002b00)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b80)={@ipv4={[], [], @multicast1}}, &(0x7f0000002bc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c00)={@rand_addr, @dev}, &(0x7f0000002c40)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000000500), 0xc, &(0x7f0000002d00)={&(0x7f0000002c80)=ANY=[]}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000000c0)=0xc) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000580)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") [ 639.605610] sock: process `syz-executor5' is using obsolete setsockopt SO_BSDCOMPAT 03:34:55 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001180)=ANY=[], &(0x7f0000000f00)) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) creat(&(0x7f0000000cc0)='./file0\x00', 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000d00)=""/158, &(0x7f0000000dc0)=0x9e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000f40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) getuid() getresuid(&(0x7f0000000300), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x17, &(0x7f0000000880)=""/23, 0x12, &(0x7f0000000940)=""/18, 0x52, &(0x7f0000000980)=""/82}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getuid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000840)=ANY=[], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0xe, &(0x7f0000000140), 0x12f) 03:34:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0xe, &(0x7f0000000140), 0x12f) 03:34:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0xe, &(0x7f0000000140), 0x12f) 03:34:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0xe, &(0x7f0000000140), 0x12f) 03:34:56 executing program 2: prctl$intptr(0x40000000002a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:56 executing program 3: mlock(&(0x7f000000f000/0x4000)=nil, 0x4000) msync(&(0x7f0000012000/0x2000)=nil, 0x2000, 0x3) 03:34:56 executing program 3: mlock(&(0x7f000000f000/0x4000)=nil, 0x4000) msync(&(0x7f0000012000/0x2000)=nil, 0x2000, 0x3) 03:34:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0xe, &(0x7f0000000140), 0x12f) 03:34:56 executing program 1: nanosleep(&(0x7f0000000040), 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180), 0x10) eventfd(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80), 0x0, 0x0, &(0x7f0000002b00)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b80)={@ipv4={[], [], @multicast1}}, &(0x7f0000002bc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c00)={@rand_addr, @dev}, &(0x7f0000002c40)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000000500), 0xc, &(0x7f0000002d00)={&(0x7f0000002c80)=ANY=[]}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000000c0)=0xc) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000580)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") 03:34:56 executing program 4: nanosleep(&(0x7f0000000040), 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180), 0x10) eventfd(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80), 0x0, 0x0, &(0x7f0000002b00)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b80)={@ipv4={[], [], @multicast1}}, &(0x7f0000002bc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c00)={@rand_addr, @dev}, &(0x7f0000002c40)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000000500), 0xc, &(0x7f0000002d00)={&(0x7f0000002c80)=ANY=[]}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000000c0)=0xc) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000580)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") 03:34:56 executing program 0: nanosleep(&(0x7f0000000040), 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180), 0x10) eventfd(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80), 0x0, 0x0, &(0x7f0000002b00)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b80)={@ipv4={[], [], @multicast1}}, &(0x7f0000002bc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c00)={@rand_addr, @dev}, &(0x7f0000002c40)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000000500), 0xc, &(0x7f0000002d00)={&(0x7f0000002c80)=ANY=[]}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000000c0)=0xc) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000580)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") 03:34:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0xe, &(0x7f0000000140), 0x12f) 03:34:57 executing program 3: mlock(&(0x7f000000f000/0x4000)=nil, 0x4000) msync(&(0x7f0000012000/0x2000)=nil, 0x2000, 0x3) 03:34:57 executing program 3: mlock(&(0x7f000000f000/0x4000)=nil, 0x4000) msync(&(0x7f0000012000/0x2000)=nil, 0x2000, 0x3) 03:34:57 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080), 0x4) 03:34:57 executing program 3: getpid() getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, &(0x7f00000000c0)=0x80) fcntl$getflags(0xffffffffffffffff, 0x0) inotify_init1(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000300)) pipe2(&(0x7f0000000240), 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) memfd_create(&(0x7f0000000280)='selinuxvboxnet1\x00', 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:57 executing program 2: prctl$intptr(0x40000000002a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:57 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080), 0x4) 03:34:57 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080), 0x4) 03:34:57 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080), 0x4) 03:34:57 executing program 1: nanosleep(&(0x7f0000000040), 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180), 0x10) eventfd(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80), 0x0, 0x0, &(0x7f0000002b00)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b80)={@ipv4={[], [], @multicast1}}, &(0x7f0000002bc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c00)={@rand_addr, @dev}, &(0x7f0000002c40)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000000500), 0xc, &(0x7f0000002d00)={&(0x7f0000002c80)=ANY=[]}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000000c0)=0xc) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000580)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") 03:34:57 executing program 4: nanosleep(&(0x7f0000000040), 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180), 0x10) eventfd(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80), 0x0, 0x0, &(0x7f0000002b00)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b80)={@ipv4={[], [], @multicast1}}, &(0x7f0000002bc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c00)={@rand_addr, @dev}, &(0x7f0000002c40)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000000500), 0xc, &(0x7f0000002d00)={&(0x7f0000002c80)=ANY=[]}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000000c0)=0xc) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000580)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") 03:34:57 executing program 0: nanosleep(&(0x7f0000000040), 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180), 0x10) eventfd(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80), 0x0, 0x0, &(0x7f0000002b00)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b80)={@ipv4={[], [], @multicast1}}, &(0x7f0000002bc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c00)={@rand_addr, @dev}, &(0x7f0000002c40)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000000500), 0xc, &(0x7f0000002d00)={&(0x7f0000002c80)=ANY=[]}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000000c0)=0xc) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000580)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") 03:34:57 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080), 0x4) 03:34:57 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080), 0x4) 03:34:58 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080), 0x4) 03:34:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x2001d070}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000540)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0xff25, &(0x7f0000000900)="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") request_key(&(0x7f0000000280)='kgyring\x00', &(0x7f00000000c0), &(0x7f0000000040)='keyring\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000340), 0x8) syz_execute_func(&(0x7f00000003c0)="46805da06ebd260f70741181a5c4230cf961d055ce73fe19fa380f78b5c4417f1201f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e6f3420faedd0703") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) timerfd_create(0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000a40)=""/4096) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000080)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) 03:34:59 executing program 1: nanosleep(&(0x7f0000000040), 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180), 0x10) eventfd(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80), 0x0, 0x0, &(0x7f0000002b00)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b80)={@ipv4={[], [], @multicast1}}, &(0x7f0000002bc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c00)={@rand_addr, @dev}, &(0x7f0000002c40)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000000500), 0xc, &(0x7f0000002d00)={&(0x7f0000002c80)=ANY=[]}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000000c0)=0xc) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000580)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") 03:34:59 executing program 2: prctl$intptr(0x40000000002a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:59 executing program 3: getpid() getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, &(0x7f00000000c0)=0x80) fcntl$getflags(0xffffffffffffffff, 0x0) inotify_init1(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000300)) pipe2(&(0x7f0000000240), 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) memfd_create(&(0x7f0000000280)='selinuxvboxnet1\x00', 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:59 executing program 4: nanosleep(&(0x7f0000000040), 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180), 0x10) eventfd(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80), 0x0, 0x0, &(0x7f0000002b00)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b80)={@ipv4={[], [], @multicast1}}, &(0x7f0000002bc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c00)={@rand_addr, @dev}, &(0x7f0000002c40)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000000500), 0xc, &(0x7f0000002d00)={&(0x7f0000002c80)=ANY=[]}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000000c0)=0xc) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000580)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") 03:34:59 executing program 0: nanosleep(&(0x7f0000000040), 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180), 0x10) eventfd(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80), 0x0, 0x0, &(0x7f0000002b00)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b80)={@ipv4={[], [], @multicast1}}, &(0x7f0000002bc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c00)={@rand_addr, @dev}, &(0x7f0000002c40)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000000500), 0xc, &(0x7f0000002d00)={&(0x7f0000002c80)=ANY=[]}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000000c0)=0xc) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000580)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") 03:34:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x2001d070}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000540)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0xff25, &(0x7f0000000900)="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") request_key(&(0x7f0000000280)='kgyring\x00', &(0x7f00000000c0), &(0x7f0000000040)='keyring\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000340), 0x8) syz_execute_func(&(0x7f00000003c0)="46805da06ebd260f70741181a5c4230cf961d055ce73fe19fa380f78b5c4417f1201f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e6f3420faedd0703") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) timerfd_create(0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000a40)=""/4096) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000080)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) 03:35:00 executing program 0: prctl$seccomp(0x2c, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000140), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) getpid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) getgid() getgid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) prctl$intptr(0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f00000007c0), &(0x7f0000000980)) getegid() getgroups(0x0, &(0x7f00000009c0)) 03:35:00 executing program 2: prctl$intptr(0x40000000002a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x2001d070}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000540)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0xff25, &(0x7f0000000900)="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") request_key(&(0x7f0000000280)='kgyring\x00', &(0x7f00000000c0), &(0x7f0000000040)='keyring\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000340), 0x8) syz_execute_func(&(0x7f00000003c0)="46805da06ebd260f70741181a5c4230cf961d055ce73fe19fa380f78b5c4417f1201f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e6f3420faedd0703") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) timerfd_create(0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000a40)=""/4096) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000080)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) 03:35:00 executing program 1: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000440), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") 03:35:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 03:35:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 03:35:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 03:35:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 03:35:00 executing program 3: getpid() getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, &(0x7f00000000c0)=0x80) fcntl$getflags(0xffffffffffffffff, 0x0) inotify_init1(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000300)) pipe2(&(0x7f0000000240), 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) memfd_create(&(0x7f0000000280)='selinuxvboxnet1\x00', 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 03:35:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 03:35:01 executing program 1: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000440), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") 03:35:01 executing program 0: prctl$seccomp(0x2c, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000140), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) getpid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) getgid() getgid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) prctl$intptr(0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f00000007c0), &(0x7f0000000980)) getegid() getgroups(0x0, &(0x7f00000009c0)) 03:35:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x2001d070}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000540)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0xff25, &(0x7f0000000900)="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") request_key(&(0x7f0000000280)='kgyring\x00', &(0x7f00000000c0), &(0x7f0000000040)='keyring\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000340), 0x8) syz_execute_func(&(0x7f00000003c0)="46805da06ebd260f70741181a5c4230cf961d055ce73fe19fa380f78b5c4417f1201f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e6f3420faedd0703") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) timerfd_create(0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000a40)=""/4096) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000080)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) 03:35:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 03:35:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 03:35:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 03:35:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 03:35:01 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)={@empty, @remote}, 0x8) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000340)={0x7}, 0x7) recvmmsg(0xffffffffffffffff, &(0x7f000000b880), 0x0, 0x0, 0x0) geteuid() setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ba40)={{{@in6=@dev, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0xe8) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000140), 0xc, &(0x7f0000000880)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000940)) socket(0x0, 0x0, 0x0) 03:35:01 executing program 2: creat(&(0x7f00000003c0)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x0, 'veth0_to_bridge\x00'}, 0x18) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000440)='trusted.overlay.nlink\x00', &(0x7f0000000480)={'\x00', 0x10000}, 0xffffffffffffff20, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000340), 0x4) pipe2$9p(&(0x7f0000000080), 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000700), 0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000380), &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000004c0), &(0x7f0000000500)=0x8) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000280), &(0x7f00000002c0)=0x4) memfd_create(&(0x7f0000000300)='trusted.overlay.nlink\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000000c0)=0x44) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @dev}}}}, &(0x7f0000000600)=0xb0) getpgrp(0x0) getpgrp(0x0) add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780), 0x0, 0x0, 0x0) 03:35:02 executing program 3: getpid() getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, &(0x7f00000000c0)=0x80) fcntl$getflags(0xffffffffffffffff, 0x0) inotify_init1(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000300)) pipe2(&(0x7f0000000240), 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) memfd_create(&(0x7f0000000280)='selinuxvboxnet1\x00', 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:02 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="d20000001777578f148fb07c1da8bdb9862d699c1a3b205f30d77c1400528aba84070fd20b79f472c09316a000422d1928aad336367d14e5ddd2e6e0be30f8fe849df51f187c409fc4835bb93f5b9dc7632f91cefa95c189c804b8a219199db82a62c455376db30ba90a7634d379e940555f464c4b6c214cfe6a40bfbd3573a280c14657d39316411e8ee23bd6aca32436bd03d1e60a3810b8102b6a403fb99952dec17e8269c3084322ec800c7ba81b4aa3114b98be42295099267e89837b6a16644d3f1b6d2a49ca5f6df17351a3ca52ef3076eab1"], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x6, 0x30, 0x0, 0x8}, &(0x7f0000000440)=0x18) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x1, "de9ce239989d6c6d", "8b7dc548bbad9971634521496fae80f1846fe91800f521df0ef3f6a0dc82ab36", 0x1, 0x36}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x40) r3 = gettid() kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={r1, r0, 0x5}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000480)=0xfffffffffffffffa, 0x4) 03:35:02 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000058c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) syz_open_dev$sndtimer(&(0x7f0000007b80)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203737c3397c2ac4611311dd8f4978c73264a7400f01ef417545d8ec2e1a6901460f01ee30215da57e35988613980f1a09") openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000001880)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000018c0), &(0x7f0000001900)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001b40)) getresgid(&(0x7f0000001b80), &(0x7f0000001bc0), &(0x7f0000001c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c40), &(0x7f0000001c80)=0xc) stat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getresgid(&(0x7f0000000280), &(0x7f0000000240), &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f80)) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getgroups(0x0, &(0x7f0000002080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000020c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002100)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002200)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002240)) fstat(0xffffffffffffffff, &(0x7f0000002280)) getgid() fstat(0xffffffffffffffff, &(0x7f00000025c0)) getresgid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000002700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getpgrp(0xffffffffffffffff) getresuid(&(0x7f00000040c0), &(0x7f0000004100), &(0x7f0000004140)) fstat(0xffffffffffffffff, &(0x7f0000004180)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in=@multicast1, @in6=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000004540)=0xe8) getresgid(&(0x7f0000004580), &(0x7f00000045c0), &(0x7f0000004600)) getpid() getresuid(&(0x7f0000005780), &(0x7f00000057c0), &(0x7f0000005800)) fstat(0xffffffffffffffff, &(0x7f0000005840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007c00)) getuid() stat(&(0x7f0000005900)='./file0\x00', &(0x7f0000005940)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000059c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005a00)={{{@in6=@ipv4={[], [], @broadcast}}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000005b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005bc0)) getuid() getresgid(&(0x7f00000003c0), &(0x7f0000000340), &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005cc0), &(0x7f0000005d00)=0xc) getuid() 03:35:02 executing program 1: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000440), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") 03:35:02 executing program 0: prctl$seccomp(0x2c, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000140), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) getpid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) getgid() getgid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) prctl$intptr(0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f00000007c0), &(0x7f0000000980)) getegid() getgroups(0x0, &(0x7f00000009c0)) 03:35:02 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="d20000001777578f148fb07c1da8bdb9862d699c1a3b205f30d77c1400528aba84070fd20b79f472c09316a000422d1928aad336367d14e5ddd2e6e0be30f8fe849df51f187c409fc4835bb93f5b9dc7632f91cefa95c189c804b8a219199db82a62c455376db30ba90a7634d379e940555f464c4b6c214cfe6a40bfbd3573a280c14657d39316411e8ee23bd6aca32436bd03d1e60a3810b8102b6a403fb99952dec17e8269c3084322ec800c7ba81b4aa3114b98be42295099267e89837b6a16644d3f1b6d2a49ca5f6df17351a3ca52ef3076eab1"], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x6, 0x30, 0x0, 0x8}, &(0x7f0000000440)=0x18) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x1, "de9ce239989d6c6d", "8b7dc548bbad9971634521496fae80f1846fe91800f521df0ef3f6a0dc82ab36", 0x1, 0x36}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x40) r3 = gettid() kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={r1, r0, 0x5}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000480)=0xfffffffffffffffa, 0x4) 03:35:02 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="d20000001777578f148fb07c1da8bdb9862d699c1a3b205f30d77c1400528aba84070fd20b79f472c09316a000422d1928aad336367d14e5ddd2e6e0be30f8fe849df51f187c409fc4835bb93f5b9dc7632f91cefa95c189c804b8a219199db82a62c455376db30ba90a7634d379e940555f464c4b6c214cfe6a40bfbd3573a280c14657d39316411e8ee23bd6aca32436bd03d1e60a3810b8102b6a403fb99952dec17e8269c3084322ec800c7ba81b4aa3114b98be42295099267e89837b6a16644d3f1b6d2a49ca5f6df17351a3ca52ef3076eab1"], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x6, 0x30, 0x0, 0x8}, &(0x7f0000000440)=0x18) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x1, "de9ce239989d6c6d", "8b7dc548bbad9971634521496fae80f1846fe91800f521df0ef3f6a0dc82ab36", 0x1, 0x36}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x40) r3 = gettid() kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={r1, r0, 0x5}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000480)=0xfffffffffffffffa, 0x4) 03:35:02 executing program 2: creat(&(0x7f00000003c0)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x0, 'veth0_to_bridge\x00'}, 0x18) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000440)='trusted.overlay.nlink\x00', &(0x7f0000000480)={'\x00', 0x10000}, 0xffffffffffffff20, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000340), 0x4) pipe2$9p(&(0x7f0000000080), 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000700), 0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000380), &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000004c0), &(0x7f0000000500)=0x8) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000280), &(0x7f00000002c0)=0x4) memfd_create(&(0x7f0000000300)='trusted.overlay.nlink\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000000c0)=0x44) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @dev}}}}, &(0x7f0000000600)=0xb0) getpgrp(0x0) getpgrp(0x0) add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780), 0x0, 0x0, 0x0) 03:35:03 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="d20000001777578f148fb07c1da8bdb9862d699c1a3b205f30d77c1400528aba84070fd20b79f472c09316a000422d1928aad336367d14e5ddd2e6e0be30f8fe849df51f187c409fc4835bb93f5b9dc7632f91cefa95c189c804b8a219199db82a62c455376db30ba90a7634d379e940555f464c4b6c214cfe6a40bfbd3573a280c14657d39316411e8ee23bd6aca32436bd03d1e60a3810b8102b6a403fb99952dec17e8269c3084322ec800c7ba81b4aa3114b98be42295099267e89837b6a16644d3f1b6d2a49ca5f6df17351a3ca52ef3076eab1"], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x6, 0x30, 0x0, 0x8}, &(0x7f0000000440)=0x18) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x1, "de9ce239989d6c6d", "8b7dc548bbad9971634521496fae80f1846fe91800f521df0ef3f6a0dc82ab36", 0x1, 0x36}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x40) r3 = gettid() kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={r1, r0, 0x5}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000480)=0xfffffffffffffffa, 0x4) 03:35:03 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="d20000001777578f148fb07c1da8bdb9862d699c1a3b205f30d77c1400528aba84070fd20b79f472c09316a000422d1928aad336367d14e5ddd2e6e0be30f8fe849df51f187c409fc4835bb93f5b9dc7632f91cefa95c189c804b8a219199db82a62c455376db30ba90a7634d379e940555f464c4b6c214cfe6a40bfbd3573a280c14657d39316411e8ee23bd6aca32436bd03d1e60a3810b8102b6a403fb99952dec17e8269c3084322ec800c7ba81b4aa3114b98be42295099267e89837b6a16644d3f1b6d2a49ca5f6df17351a3ca52ef3076eab1"], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x6, 0x30, 0x0, 0x8}, &(0x7f0000000440)=0x18) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x1, "de9ce239989d6c6d", "8b7dc548bbad9971634521496fae80f1846fe91800f521df0ef3f6a0dc82ab36", 0x1, 0x36}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x40) r3 = gettid() kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={r1, r0, 0x5}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000480)=0xfffffffffffffffa, 0x4) 03:35:03 executing program 1: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000440), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") 03:35:03 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000058c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) syz_open_dev$sndtimer(&(0x7f0000007b80)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203737c3397c2ac4611311dd8f4978c73264a7400f01ef417545d8ec2e1a6901460f01ee30215da57e35988613980f1a09") openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000001880)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000018c0), &(0x7f0000001900)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001b40)) getresgid(&(0x7f0000001b80), &(0x7f0000001bc0), &(0x7f0000001c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c40), &(0x7f0000001c80)=0xc) stat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getresgid(&(0x7f0000000280), &(0x7f0000000240), &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f80)) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getgroups(0x0, &(0x7f0000002080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000020c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002100)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002200)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002240)) fstat(0xffffffffffffffff, &(0x7f0000002280)) getgid() fstat(0xffffffffffffffff, &(0x7f00000025c0)) getresgid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000002700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getpgrp(0xffffffffffffffff) getresuid(&(0x7f00000040c0), &(0x7f0000004100), &(0x7f0000004140)) fstat(0xffffffffffffffff, &(0x7f0000004180)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in=@multicast1, @in6=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000004540)=0xe8) getresgid(&(0x7f0000004580), &(0x7f00000045c0), &(0x7f0000004600)) getpid() getresuid(&(0x7f0000005780), &(0x7f00000057c0), &(0x7f0000005800)) fstat(0xffffffffffffffff, &(0x7f0000005840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007c00)) getuid() stat(&(0x7f0000005900)='./file0\x00', &(0x7f0000005940)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000059c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005a00)={{{@in6=@ipv4={[], [], @broadcast}}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000005b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005bc0)) getuid() getresgid(&(0x7f00000003c0), &(0x7f0000000340), &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005cc0), &(0x7f0000005d00)=0xc) getuid() 03:35:04 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000058c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) syz_open_dev$sndtimer(&(0x7f0000007b80)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203737c3397c2ac4611311dd8f4978c73264a7400f01ef417545d8ec2e1a6901460f01ee30215da57e35988613980f1a09") openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000001880)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000018c0), &(0x7f0000001900)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001b40)) getresgid(&(0x7f0000001b80), &(0x7f0000001bc0), &(0x7f0000001c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c40), &(0x7f0000001c80)=0xc) stat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getresgid(&(0x7f0000000280), &(0x7f0000000240), &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f80)) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getgroups(0x0, &(0x7f0000002080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000020c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002100)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002200)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002240)) fstat(0xffffffffffffffff, &(0x7f0000002280)) getgid() fstat(0xffffffffffffffff, &(0x7f00000025c0)) getresgid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000002700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getpgrp(0xffffffffffffffff) getresuid(&(0x7f00000040c0), &(0x7f0000004100), &(0x7f0000004140)) fstat(0xffffffffffffffff, &(0x7f0000004180)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in=@multicast1, @in6=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000004540)=0xe8) getresgid(&(0x7f0000004580), &(0x7f00000045c0), &(0x7f0000004600)) getpid() getresuid(&(0x7f0000005780), &(0x7f00000057c0), &(0x7f0000005800)) fstat(0xffffffffffffffff, &(0x7f0000005840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007c00)) getuid() stat(&(0x7f0000005900)='./file0\x00', &(0x7f0000005940)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000059c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005a00)={{{@in6=@ipv4={[], [], @broadcast}}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000005b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005bc0)) getuid() getresgid(&(0x7f00000003c0), &(0x7f0000000340), &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005cc0), &(0x7f0000005d00)=0xc) getuid() 03:35:04 executing program 0: prctl$seccomp(0x2c, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000140), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) getpid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) getgid() getgid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) prctl$intptr(0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f00000007c0), &(0x7f0000000980)) getegid() getgroups(0x0, &(0x7f00000009c0)) 03:35:04 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="d20000001777578f148fb07c1da8bdb9862d699c1a3b205f30d77c1400528aba84070fd20b79f472c09316a000422d1928aad336367d14e5ddd2e6e0be30f8fe849df51f187c409fc4835bb93f5b9dc7632f91cefa95c189c804b8a219199db82a62c455376db30ba90a7634d379e940555f464c4b6c214cfe6a40bfbd3573a280c14657d39316411e8ee23bd6aca32436bd03d1e60a3810b8102b6a403fb99952dec17e8269c3084322ec800c7ba81b4aa3114b98be42295099267e89837b6a16644d3f1b6d2a49ca5f6df17351a3ca52ef3076eab1"], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x6, 0x30, 0x0, 0x8}, &(0x7f0000000440)=0x18) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x1, "de9ce239989d6c6d", "8b7dc548bbad9971634521496fae80f1846fe91800f521df0ef3f6a0dc82ab36", 0x1, 0x36}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x40) r3 = gettid() kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={r1, r0, 0x5}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000480)=0xfffffffffffffffa, 0x4) 03:35:04 executing program 2: creat(&(0x7f00000003c0)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x0, 'veth0_to_bridge\x00'}, 0x18) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000440)='trusted.overlay.nlink\x00', &(0x7f0000000480)={'\x00', 0x10000}, 0xffffffffffffff20, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000340), 0x4) pipe2$9p(&(0x7f0000000080), 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000700), 0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000380), &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000004c0), &(0x7f0000000500)=0x8) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000280), &(0x7f00000002c0)=0x4) memfd_create(&(0x7f0000000300)='trusted.overlay.nlink\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000000c0)=0x44) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @dev}}}}, &(0x7f0000000600)=0xb0) getpgrp(0x0) getpgrp(0x0) add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780), 0x0, 0x0, 0x0) 03:35:04 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="d20000001777578f148fb07c1da8bdb9862d699c1a3b205f30d77c1400528aba84070fd20b79f472c09316a000422d1928aad336367d14e5ddd2e6e0be30f8fe849df51f187c409fc4835bb93f5b9dc7632f91cefa95c189c804b8a219199db82a62c455376db30ba90a7634d379e940555f464c4b6c214cfe6a40bfbd3573a280c14657d39316411e8ee23bd6aca32436bd03d1e60a3810b8102b6a403fb99952dec17e8269c3084322ec800c7ba81b4aa3114b98be42295099267e89837b6a16644d3f1b6d2a49ca5f6df17351a3ca52ef3076eab1"], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x6, 0x30, 0x0, 0x8}, &(0x7f0000000440)=0x18) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x1, "de9ce239989d6c6d", "8b7dc548bbad9971634521496fae80f1846fe91800f521df0ef3f6a0dc82ab36", 0x1, 0x36}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x40) r3 = gettid() kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={r1, r0, 0x5}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000480)=0xfffffffffffffffa, 0x4) 03:35:04 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="d20000001777578f148fb07c1da8bdb9862d699c1a3b205f30d77c1400528aba84070fd20b79f472c09316a000422d1928aad336367d14e5ddd2e6e0be30f8fe849df51f187c409fc4835bb93f5b9dc7632f91cefa95c189c804b8a219199db82a62c455376db30ba90a7634d379e940555f464c4b6c214cfe6a40bfbd3573a280c14657d39316411e8ee23bd6aca32436bd03d1e60a3810b8102b6a403fb99952dec17e8269c3084322ec800c7ba81b4aa3114b98be42295099267e89837b6a16644d3f1b6d2a49ca5f6df17351a3ca52ef3076eab1"], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x6, 0x30, 0x0, 0x8}, &(0x7f0000000440)=0x18) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x1, "de9ce239989d6c6d", "8b7dc548bbad9971634521496fae80f1846fe91800f521df0ef3f6a0dc82ab36", 0x1, 0x36}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x40) r3 = gettid() kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={r1, r0, 0x5}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000480)=0xfffffffffffffffa, 0x4) 03:35:04 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="d20000001777578f148fb07c1da8bdb9862d699c1a3b205f30d77c1400528aba84070fd20b79f472c09316a000422d1928aad336367d14e5ddd2e6e0be30f8fe849df51f187c409fc4835bb93f5b9dc7632f91cefa95c189c804b8a219199db82a62c455376db30ba90a7634d379e940555f464c4b6c214cfe6a40bfbd3573a280c14657d39316411e8ee23bd6aca32436bd03d1e60a3810b8102b6a403fb99952dec17e8269c3084322ec800c7ba81b4aa3114b98be42295099267e89837b6a16644d3f1b6d2a49ca5f6df17351a3ca52ef3076eab1"], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x6, 0x30, 0x0, 0x8}, &(0x7f0000000440)=0x18) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x1, "de9ce239989d6c6d", "8b7dc548bbad9971634521496fae80f1846fe91800f521df0ef3f6a0dc82ab36", 0x1, 0x36}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x40) r3 = gettid() kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={r1, r0, 0x5}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000480)=0xfffffffffffffffa, 0x4) 03:35:04 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="d20000001777578f148fb07c1da8bdb9862d699c1a3b205f30d77c1400528aba84070fd20b79f472c09316a000422d1928aad336367d14e5ddd2e6e0be30f8fe849df51f187c409fc4835bb93f5b9dc7632f91cefa95c189c804b8a219199db82a62c455376db30ba90a7634d379e940555f464c4b6c214cfe6a40bfbd3573a280c14657d39316411e8ee23bd6aca32436bd03d1e60a3810b8102b6a403fb99952dec17e8269c3084322ec800c7ba81b4aa3114b98be42295099267e89837b6a16644d3f1b6d2a49ca5f6df17351a3ca52ef3076eab1"], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x6, 0x30, 0x0, 0x8}, &(0x7f0000000440)=0x18) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x1, "de9ce239989d6c6d", "8b7dc548bbad9971634521496fae80f1846fe91800f521df0ef3f6a0dc82ab36", 0x1, 0x36}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x40) r3 = gettid() kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={r1, r0, 0x5}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000480)=0xfffffffffffffffa, 0x4) 03:35:04 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="d20000001777578f148fb07c1da8bdb9862d699c1a3b205f30d77c1400528aba84070fd20b79f472c09316a000422d1928aad336367d14e5ddd2e6e0be30f8fe849df51f187c409fc4835bb93f5b9dc7632f91cefa95c189c804b8a219199db82a62c455376db30ba90a7634d379e940555f464c4b6c214cfe6a40bfbd3573a280c14657d39316411e8ee23bd6aca32436bd03d1e60a3810b8102b6a403fb99952dec17e8269c3084322ec800c7ba81b4aa3114b98be42295099267e89837b6a16644d3f1b6d2a49ca5f6df17351a3ca52ef3076eab1"], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x6, 0x30, 0x0, 0x8}, &(0x7f0000000440)=0x18) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x1, "de9ce239989d6c6d", "8b7dc548bbad9971634521496fae80f1846fe91800f521df0ef3f6a0dc82ab36", 0x1, 0x36}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x40) r3 = gettid() kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={r1, r0, 0x5}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000480)=0xfffffffffffffffa, 0x4) 03:35:04 executing program 1: clock_gettime(0x3, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ef194c16d032a14c1c20096fce6c34d75908e6a638906849c887fc65f89c35ebdce1f69674fe426a7a2dfc375530b2f64ba79d0a738985c47d71a67cd14d5ad8", "de43e222f17c6667c96b26de832c5459c7a1fc29deb96f70e6f25e94674bd12646f8a1e5aad6fdc565a55f7ac531d53c9cade4ca7d34048a64b19e38908d2c75", "aaca97be00f67daecdd5d5bd1c34983e5a49b04562ac33580ed565a6acf6f1c7"}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000580)) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) ppoll(&(0x7f0000000380), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x8) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @dev}}, 0x5c) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040), 0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") prctl$setendian(0x14, 0x0) 03:35:04 executing program 4: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000f80)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgroups(0x0, &(0x7f00000009c0)) getpgrp(0x0) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgid() getpid() stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getgroups(0x0, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000d40)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000d80)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) getpid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) sendmsg$unix(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000940), 0x0, &(0x7f0000001140)=ANY=[]}, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000180)=0x10) getpeername$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs, &(0x7f0000000540)=0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 03:35:05 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000058c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) syz_open_dev$sndtimer(&(0x7f0000007b80)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203737c3397c2ac4611311dd8f4978c73264a7400f01ef417545d8ec2e1a6901460f01ee30215da57e35988613980f1a09") openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000001880)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000018c0), &(0x7f0000001900)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001b40)) getresgid(&(0x7f0000001b80), &(0x7f0000001bc0), &(0x7f0000001c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c40), &(0x7f0000001c80)=0xc) stat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getresgid(&(0x7f0000000280), &(0x7f0000000240), &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f80)) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getgroups(0x0, &(0x7f0000002080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000020c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002100)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002200)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002240)) fstat(0xffffffffffffffff, &(0x7f0000002280)) getgid() fstat(0xffffffffffffffff, &(0x7f00000025c0)) getresgid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000002700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getpgrp(0xffffffffffffffff) getresuid(&(0x7f00000040c0), &(0x7f0000004100), &(0x7f0000004140)) fstat(0xffffffffffffffff, &(0x7f0000004180)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in=@multicast1, @in6=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000004540)=0xe8) getresgid(&(0x7f0000004580), &(0x7f00000045c0), &(0x7f0000004600)) getpid() getresuid(&(0x7f0000005780), &(0x7f00000057c0), &(0x7f0000005800)) fstat(0xffffffffffffffff, &(0x7f0000005840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007c00)) getuid() stat(&(0x7f0000005900)='./file0\x00', &(0x7f0000005940)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000059c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005a00)={{{@in6=@ipv4={[], [], @broadcast}}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000005b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005bc0)) getuid() getresgid(&(0x7f00000003c0), &(0x7f0000000340), &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005cc0), &(0x7f0000005d00)=0xc) getuid() 03:35:05 executing program 2: creat(&(0x7f00000003c0)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x0, 'veth0_to_bridge\x00'}, 0x18) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000440)='trusted.overlay.nlink\x00', &(0x7f0000000480)={'\x00', 0x10000}, 0xffffffffffffff20, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000340), 0x4) pipe2$9p(&(0x7f0000000080), 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000700), 0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000380), &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000004c0), &(0x7f0000000500)=0x8) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000280), &(0x7f00000002c0)=0x4) memfd_create(&(0x7f0000000300)='trusted.overlay.nlink\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000000c0)=0x44) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @dev}}}}, &(0x7f0000000600)=0xb0) getpgrp(0x0) getpgrp(0x0) add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780), 0x0, 0x0, 0x0) 03:35:05 executing program 0: rt_sigpending(&(0x7f00000000c0), 0x8) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) semget$private(0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000900), &(0x7f00000009c0)=0x98) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xc) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:35:05 executing program 1: clock_gettime(0x3, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ef194c16d032a14c1c20096fce6c34d75908e6a638906849c887fc65f89c35ebdce1f69674fe426a7a2dfc375530b2f64ba79d0a738985c47d71a67cd14d5ad8", "de43e222f17c6667c96b26de832c5459c7a1fc29deb96f70e6f25e94674bd12646f8a1e5aad6fdc565a55f7ac531d53c9cade4ca7d34048a64b19e38908d2c75", "aaca97be00f67daecdd5d5bd1c34983e5a49b04562ac33580ed565a6acf6f1c7"}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000580)) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) ppoll(&(0x7f0000000380), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x8) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @dev}}, 0x5c) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040), 0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") prctl$setendian(0x14, 0x0) 03:35:05 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="d20000001777578f148fb07c1da8bdb9862d699c1a3b205f30d77c1400528aba84070fd20b79f472c09316a000422d1928aad336367d14e5ddd2e6e0be30f8fe849df51f187c409fc4835bb93f5b9dc7632f91cefa95c189c804b8a219199db82a62c455376db30ba90a7634d379e940555f464c4b6c214cfe6a40bfbd3573a280c14657d39316411e8ee23bd6aca32436bd03d1e60a3810b8102b6a403fb99952dec17e8269c3084322ec800c7ba81b4aa3114b98be42295099267e89837b6a16644d3f1b6d2a49ca5f6df17351a3ca52ef3076eab1"], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x6, 0x30, 0x0, 0x8}, &(0x7f0000000440)=0x18) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x1, "de9ce239989d6c6d", "8b7dc548bbad9971634521496fae80f1846fe91800f521df0ef3f6a0dc82ab36", 0x1, 0x36}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x40) r3 = gettid() kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={r1, r0, 0x5}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000480)=0xfffffffffffffffa, 0x4) 03:35:05 executing program 4: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000f80)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgroups(0x0, &(0x7f00000009c0)) getpgrp(0x0) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgid() getpid() stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getgroups(0x0, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000d40)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000d80)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) getpid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) sendmsg$unix(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000940), 0x0, &(0x7f0000001140)=ANY=[]}, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000180)=0x10) getpeername$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs, &(0x7f0000000540)=0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 03:35:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000400)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0xc8) 03:35:06 executing program 2: clock_gettime(0x7fffffffffffffc, &(0x7f0000000440)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000940)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000980), &(0x7f00000009c0)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000a00), 0xc) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000080), &(0x7f00000002c0)=0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000400)) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000380), &(0x7f00000003c0)=0x8) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f0000000500)='statm\x00') ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockname(0xffffffffffffffff, &(0x7f00000005c0)=@hci, &(0x7f0000000640)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'vcan0\x00'}) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000780)={@remote, @local}, &(0x7f00000007c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vcan0\x00'}) accept(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005780)={'erspan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000057c0)={'ipddp0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000058c0)={{{@in=@loopback, @in=@local}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f00000059c0)=0xe8) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000900), 0x8) accept4$packet(0xffffffffffffffff, &(0x7f0000006100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006140)=0x14, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000064c0)={&(0x7f0000000540), 0xc, &(0x7f0000006480)={&(0x7f0000006180)=ANY=[]}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 03:35:06 executing program 0: rt_sigpending(&(0x7f00000000c0), 0x8) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) semget$private(0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000900), &(0x7f00000009c0)=0x98) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xc) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:35:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000400)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0xc8) 03:35:06 executing program 1: clock_gettime(0x3, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ef194c16d032a14c1c20096fce6c34d75908e6a638906849c887fc65f89c35ebdce1f69674fe426a7a2dfc375530b2f64ba79d0a738985c47d71a67cd14d5ad8", "de43e222f17c6667c96b26de832c5459c7a1fc29deb96f70e6f25e94674bd12646f8a1e5aad6fdc565a55f7ac531d53c9cade4ca7d34048a64b19e38908d2c75", "aaca97be00f67daecdd5d5bd1c34983e5a49b04562ac33580ed565a6acf6f1c7"}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000580)) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) ppoll(&(0x7f0000000380), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x8) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @dev}}, 0x5c) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040), 0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") prctl$setendian(0x14, 0x0) 03:35:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000400)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0xc8) 03:35:06 executing program 4: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000f80)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgroups(0x0, &(0x7f00000009c0)) getpgrp(0x0) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgid() getpid() stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getgroups(0x0, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000d40)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000d80)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) getpid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) sendmsg$unix(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000940), 0x0, &(0x7f0000001140)=ANY=[]}, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000180)=0x10) getpeername$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs, &(0x7f0000000540)=0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 03:35:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000400)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0xc8) 03:35:06 executing program 5: r0 = gettid() exit(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") move_pages(r0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000200), 0x0) 03:35:07 executing program 2: clock_gettime(0x7fffffffffffffc, &(0x7f0000000440)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000940)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000980), &(0x7f00000009c0)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000a00), 0xc) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000080), &(0x7f00000002c0)=0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000400)) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000380), &(0x7f00000003c0)=0x8) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f0000000500)='statm\x00') ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockname(0xffffffffffffffff, &(0x7f00000005c0)=@hci, &(0x7f0000000640)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'vcan0\x00'}) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000780)={@remote, @local}, &(0x7f00000007c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vcan0\x00'}) accept(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005780)={'erspan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000057c0)={'ipddp0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000058c0)={{{@in=@loopback, @in=@local}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f00000059c0)=0xe8) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000900), 0x8) accept4$packet(0xffffffffffffffff, &(0x7f0000006100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006140)=0x14, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000064c0)={&(0x7f0000000540), 0xc, &(0x7f0000006480)={&(0x7f0000006180)=ANY=[]}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 03:35:07 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="d20000001777578f148fb07c1da8bdb9862d699c1a3b205f30d77c1400528aba84070fd20b79f472c09316a000422d1928aad336367d14e5ddd2e6e0be30f8fe849df51f187c409fc4835bb93f5b9dc7632f91cefa95c189c804b8a219199db82a62c455376db30ba90a7634d379e940555f464c4b6c214cfe6a40bfbd3573a280c14657d39316411e8ee23bd6aca32436bd03d1e60a3810b8102b6a403fb99952dec17e8269c3084322ec800c7ba81b4aa3114b98be42295099267e89837b6a16644d3f1b6d2a49ca5f6df17351a3ca52ef3076eab1"], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x6, 0x30, 0x0, 0x8}, &(0x7f0000000440)=0x18) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x1, "de9ce239989d6c6d", "8b7dc548bbad9971634521496fae80f1846fe91800f521df0ef3f6a0dc82ab36", 0x1, 0x36}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x40) r3 = gettid() kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={r1, r0, 0x5}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000480)=0xfffffffffffffffa, 0x4) 03:35:07 executing program 0: rt_sigpending(&(0x7f00000000c0), 0x8) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) semget$private(0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000900), &(0x7f00000009c0)=0x98) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xc) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:35:07 executing program 1: clock_gettime(0x3, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ef194c16d032a14c1c20096fce6c34d75908e6a638906849c887fc65f89c35ebdce1f69674fe426a7a2dfc375530b2f64ba79d0a738985c47d71a67cd14d5ad8", "de43e222f17c6667c96b26de832c5459c7a1fc29deb96f70e6f25e94674bd12646f8a1e5aad6fdc565a55f7ac531d53c9cade4ca7d34048a64b19e38908d2c75", "aaca97be00f67daecdd5d5bd1c34983e5a49b04562ac33580ed565a6acf6f1c7"}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000580)) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) ppoll(&(0x7f0000000380), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x8) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @dev}}, 0x5c) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040), 0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") prctl$setendian(0x14, 0x0) 03:35:07 executing program 4: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000f80)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgroups(0x0, &(0x7f00000009c0)) getpgrp(0x0) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgid() getpid() stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getgroups(0x0, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000d40)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000d80)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) getpid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) sendmsg$unix(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000940), 0x0, &(0x7f0000001140)=ANY=[]}, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000180)=0x10) getpeername$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs, &(0x7f0000000540)=0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 03:35:07 executing program 5: r0 = gettid() exit(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") move_pages(r0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000200), 0x0) 03:35:07 executing program 2: clock_gettime(0x7fffffffffffffc, &(0x7f0000000440)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000940)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000980), &(0x7f00000009c0)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000a00), 0xc) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000080), &(0x7f00000002c0)=0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000400)) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000380), &(0x7f00000003c0)=0x8) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f0000000500)='statm\x00') ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockname(0xffffffffffffffff, &(0x7f00000005c0)=@hci, &(0x7f0000000640)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'vcan0\x00'}) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000780)={@remote, @local}, &(0x7f00000007c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vcan0\x00'}) accept(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005780)={'erspan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000057c0)={'ipddp0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000058c0)={{{@in=@loopback, @in=@local}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f00000059c0)=0xe8) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000900), 0x8) accept4$packet(0xffffffffffffffff, &(0x7f0000006100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006140)=0x14, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000064c0)={&(0x7f0000000540), 0xc, &(0x7f0000006480)={&(0x7f0000006180)=ANY=[]}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 03:35:08 executing program 1: r0 = gettid() exit(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") move_pages(r0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000200), 0x0) 03:35:08 executing program 0: rt_sigpending(&(0x7f00000000c0), 0x8) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) semget$private(0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000900), &(0x7f00000009c0)=0x98) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xc) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:35:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:35:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:35:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:35:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:35:08 executing program 5: r0 = gettid() exit(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") move_pages(r0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000200), 0x0) 03:35:08 executing program 2: clock_gettime(0x7fffffffffffffc, &(0x7f0000000440)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000940)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000980), &(0x7f00000009c0)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000a00), 0xc) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000080), &(0x7f00000002c0)=0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000400)) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000380), &(0x7f00000003c0)=0x8) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f0000000500)='statm\x00') ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockname(0xffffffffffffffff, &(0x7f00000005c0)=@hci, &(0x7f0000000640)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'vcan0\x00'}) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000780)={@remote, @local}, &(0x7f00000007c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vcan0\x00'}) accept(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005780)={'erspan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000057c0)={'ipddp0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000058c0)={{{@in=@loopback, @in=@local}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f00000059c0)=0xe8) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000900), 0x8) accept4$packet(0xffffffffffffffff, &(0x7f0000006100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006140)=0x14, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000064c0)={&(0x7f0000000540), 0xc, &(0x7f0000006480)={&(0x7f0000006180)=ANY=[]}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 03:35:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:35:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:35:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:35:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:35:09 executing program 1: r0 = gettid() exit(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") move_pages(r0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000200), 0x0) 03:35:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:35:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:35:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:35:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:35:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:35:09 executing program 5: r0 = gettid() exit(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") move_pages(r0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000200), 0x0) 03:35:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:35:09 executing program 4: getgid() seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000007c0)='asymmetric\x00', &(0x7f0000000800), &(0x7f0000000840)='ceph\x00', 0xfffffffffffffffa) request_key(&(0x7f00000008c0)='keyring\x00', &(0x7f0000000900), &(0x7f0000000940)='mime_type\x00', 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000880), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) socket$nl_crypto(0x10, 0x3, 0x15) fstat(0xffffffffffffffff, &(0x7f00000006c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000600)='/dev/snapshot\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000640)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/123, &(0x7f0000000140)=0x7b) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280), 0x4) add_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240), &(0x7f0000000280), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000480)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f0000000540)=0x98) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000580), 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) keyctl$link(0x8, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000780)) keyctl$unlink(0x9, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:35:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="cd8075a0e36969ef69dc00d9908a20261192000880410fd1b0b5d90000397c2a0f1fcdae300f3821b14080647f41dfe0400f01efe5e57d0f1c1c0a1a63460f45dfde9f") 03:35:09 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:10 executing program 1: r0 = gettid() exit(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") move_pages(r0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000200), 0x0) 03:35:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="cd8075a0e36969ef69dc00d9908a20261192000880410fd1b0b5d90000397c2a0f1fcdae300f3821b14080647f41dfe0400f01efe5e57d0f1c1c0a1a63460f45dfde9f") 03:35:10 executing program 5: getpriority(0x0, 0x0) gettid() gettid() getpid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)) getpid() sched_setattr(0x0, &(0x7f00000002c0), 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000240)) creat(&(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540), 0x98) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000280)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={"7465616d5f736c6176e55f3100", @ifru_hwaddr=@dev}) seccomp(0x0, 0x0, &(0x7f0000000100)) timerfd_create(0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') 03:35:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:35:10 executing program 4: getgid() seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000007c0)='asymmetric\x00', &(0x7f0000000800), &(0x7f0000000840)='ceph\x00', 0xfffffffffffffffa) request_key(&(0x7f00000008c0)='keyring\x00', &(0x7f0000000900), &(0x7f0000000940)='mime_type\x00', 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000880), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) socket$nl_crypto(0x10, 0x3, 0x15) fstat(0xffffffffffffffff, &(0x7f00000006c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000600)='/dev/snapshot\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000640)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/123, &(0x7f0000000140)=0x7b) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280), 0x4) add_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240), &(0x7f0000000280), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000480)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f0000000540)=0x98) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000580), 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) keyctl$link(0x8, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000780)) keyctl$unlink(0x9, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:10 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:10 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="cd8075a0e36969ef69dc00d9908a20261192000880410fd1b0b5d90000397c2a0f1fcdae300f3821b14080647f41dfe0400f01efe5e57d0f1c1c0a1a63460f45dfde9f") 03:35:11 executing program 5: getpriority(0x0, 0x0) gettid() gettid() getpid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)) getpid() sched_setattr(0x0, &(0x7f00000002c0), 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000240)) creat(&(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540), 0x98) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000280)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={"7465616d5f736c6176e55f3100", @ifru_hwaddr=@dev}) seccomp(0x0, 0x0, &(0x7f0000000100)) timerfd_create(0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') 03:35:11 executing program 4: getgid() seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000007c0)='asymmetric\x00', &(0x7f0000000800), &(0x7f0000000840)='ceph\x00', 0xfffffffffffffffa) request_key(&(0x7f00000008c0)='keyring\x00', &(0x7f0000000900), &(0x7f0000000940)='mime_type\x00', 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000880), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) socket$nl_crypto(0x10, 0x3, 0x15) fstat(0xffffffffffffffff, &(0x7f00000006c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000600)='/dev/snapshot\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000640)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/123, &(0x7f0000000140)=0x7b) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280), 0x4) add_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240), &(0x7f0000000280), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000480)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f0000000540)=0x98) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000580), 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) keyctl$link(0x8, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000780)) keyctl$unlink(0x9, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:11 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:11 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="cd8075a0e36969ef69dc00d9908a20261192000880410fd1b0b5d90000397c2a0f1fcdae300f3821b14080647f41dfe0400f01efe5e57d0f1c1c0a1a63460f45dfde9f") 03:35:12 executing program 5: getpriority(0x0, 0x0) gettid() gettid() getpid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)) getpid() sched_setattr(0x0, &(0x7f00000002c0), 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000240)) creat(&(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540), 0x98) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000280)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={"7465616d5f736c6176e55f3100", @ifru_hwaddr=@dev}) seccomp(0x0, 0x0, &(0x7f0000000100)) timerfd_create(0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') 03:35:12 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:12 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:12 executing program 4: getgid() seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000007c0)='asymmetric\x00', &(0x7f0000000800), &(0x7f0000000840)='ceph\x00', 0xfffffffffffffffa) request_key(&(0x7f00000008c0)='keyring\x00', &(0x7f0000000900), &(0x7f0000000940)='mime_type\x00', 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000880), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) socket$nl_crypto(0x10, 0x3, 0x15) fstat(0xffffffffffffffff, &(0x7f00000006c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000600)='/dev/snapshot\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000640)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/123, &(0x7f0000000140)=0x7b) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280), 0x4) add_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240), &(0x7f0000000280), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000480)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f0000000540)=0x98) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000580), 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) keyctl$link(0x8, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000780)) keyctl$unlink(0x9, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:12 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:13 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:13 executing program 5: getpriority(0x0, 0x0) gettid() gettid() getpid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)) getpid() sched_setattr(0x0, &(0x7f00000002c0), 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000240)) creat(&(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540), 0x98) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000280)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={"7465616d5f736c6176e55f3100", @ifru_hwaddr=@dev}) seccomp(0x0, 0x0, &(0x7f0000000100)) timerfd_create(0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') 03:35:13 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:13 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:13 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:14 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:14 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:14 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:14 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:14 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:15 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:15 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:15 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:15 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:15 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:15 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:16 executing program 1: shmget$private(0x7a, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f383066470f3a63cb00bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298c441fd2fe47d") 03:35:16 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:16 executing program 4: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmdt(0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10) set_mempolicy(0x0, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @remote}, &(0x7f0000000400)=0xc) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:16 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f0000000240)}, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000002c0), &(0x7f0000000300)=0x4) io_setup(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:16 executing program 0: clock_gettime(0x0, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) gettid() creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000180)) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000140)) readlink(&(0x7f0000000080)='./file1\x00', &(0x7f00000001c0)=""/213, 0xd5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000340)=0x78) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getresuid(&(0x7f0000000500), &(0x7f0000000400), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) fstat(0xffffffffffffffff, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:17 executing program 0: clock_gettime(0x0, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) gettid() creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000180)) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000140)) readlink(&(0x7f0000000080)='./file1\x00', &(0x7f00000001c0)=""/213, 0xd5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000340)=0x78) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getresuid(&(0x7f0000000500), &(0x7f0000000400), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) fstat(0xffffffffffffffff, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:17 executing program 1: shmget$private(0x7a, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f383066470f3a63cb00bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298c441fd2fe47d") 03:35:18 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x33, &(0x7f0000000200)="2c4040656d3170707031c62e2d215ca975736572766d6e657431766d6e65743173656c696e7578657468307472757374656400"}, 0x30) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:18 executing program 0: clock_gettime(0x0, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) gettid() creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000180)) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000140)) readlink(&(0x7f0000000080)='./file1\x00', &(0x7f00000001c0)=""/213, 0xd5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000340)=0x78) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getresuid(&(0x7f0000000500), &(0x7f0000000400), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) fstat(0xffffffffffffffff, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:18 executing program 4: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmdt(0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10) set_mempolicy(0x0, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @remote}, &(0x7f0000000400)=0xc) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:18 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmdt(0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10) set_mempolicy(0x0, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @remote}, &(0x7f0000000400)=0xc) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:18 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f0000000240)}, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000002c0), &(0x7f0000000300)=0x4) io_setup(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:18 executing program 1: shmget$private(0x7a, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f383066470f3a63cb00bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298c441fd2fe47d") 03:35:18 executing program 0: clock_gettime(0x0, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) gettid() creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000180)) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000140)) readlink(&(0x7f0000000080)='./file1\x00', &(0x7f00000001c0)=""/213, 0xd5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000340)=0x78) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getresuid(&(0x7f0000000500), &(0x7f0000000400), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) fstat(0xffffffffffffffff, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:18 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmdt(0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10) set_mempolicy(0x0, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @remote}, &(0x7f0000000400)=0xc) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:18 executing program 4: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmdt(0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10) set_mempolicy(0x0, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @remote}, &(0x7f0000000400)=0xc) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:18 executing program 0: creat(&(0x7f0000000440)='./file2\x00', 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) eventfd2(0x0, 0x0) pipe2(&(0x7f0000000180), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) socket$inet6_udplite(0xa, 0x2, 0x88) umount2(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0xffffffffffffff08) getsockname$inet(0xffffffffffffffff, &(0x7f00000006c0)={0x2, 0x0, @dev}, &(0x7f00000018c0)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000400)="5ac05eeb30e042240f78708003cd94ec", 0x10) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001900)) openat$dir(0xffffffffffffff9c, &(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000540)={"6e7f1909000000000000000000000040"}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000019c0)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) 03:35:18 executing program 1: shmget$private(0x7a, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f383066470f3a63cb00bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298c441fd2fe47d") 03:35:18 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f0000000240)}, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000002c0), &(0x7f0000000300)=0x4) io_setup(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:20 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f0000000240)}, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000002c0), &(0x7f0000000300)=0x4) io_setup(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:20 executing program 0: creat(&(0x7f0000000440)='./file2\x00', 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) eventfd2(0x0, 0x0) pipe2(&(0x7f0000000180), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) socket$inet6_udplite(0xa, 0x2, 0x88) umount2(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0xffffffffffffff08) getsockname$inet(0xffffffffffffffff, &(0x7f00000006c0)={0x2, 0x0, @dev}, &(0x7f00000018c0)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000400)="5ac05eeb30e042240f78708003cd94ec", 0x10) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001900)) openat$dir(0xffffffffffffff9c, &(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000540)={"6e7f1909000000000000000000000040"}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000019c0)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) 03:35:20 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmdt(0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10) set_mempolicy(0x0, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @remote}, &(0x7f0000000400)=0xc) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000000)={&(0x7f00000002c0)=@ipv6_newroute={0x30, 0x18, 0x201, 0x0, 0x0, {}, [@RTA_ENCAP={0xc, 0x16, @typed={0x8, 0x0, @u32}}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x1}]}, 0xfda0}}, 0x0) 03:35:20 executing program 4: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmdt(0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10) set_mempolicy(0x0, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @remote}, &(0x7f0000000400)=0xc) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:20 executing program 3: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$input_event(0xffffffffffffffff, &(0x7f00000002c0)={{0x77359400}}, 0x18) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) stat(&(0x7f00000008c0)='./bus\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getgid() getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003880)) geteuid() getgroups(0x0, &(0x7f00000038c0)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000003900)='./bus\x00', &(0x7f0000003940)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000039c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003a00)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000003b00)=0xe8) getresgid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003c00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c40)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000003d40)=0xe8) getgroups(0x0, &(0x7f0000003d80)) 03:35:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000000)={&(0x7f00000002c0)=@ipv6_newroute={0x30, 0x18, 0x201, 0x0, 0x0, {}, [@RTA_ENCAP={0xc, 0x16, @typed={0x8, 0x0, @u32}}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x1}]}, 0xfda0}}, 0x0) [ 663.743641] netlink: 'syz-executor1': attribute type 21 has an invalid length. 03:35:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000000)={&(0x7f00000002c0)=@ipv6_newroute={0x30, 0x18, 0x201, 0x0, 0x0, {}, [@RTA_ENCAP={0xc, 0x16, @typed={0x8, 0x0, @u32}}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x1}]}, 0xfda0}}, 0x0) [ 663.802430] netlink: 'syz-executor1': attribute type 21 has an invalid length. 03:35:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000000)={&(0x7f00000002c0)=@ipv6_newroute={0x30, 0x18, 0x201, 0x0, 0x0, {}, [@RTA_ENCAP={0xc, 0x16, @typed={0x8, 0x0, @u32}}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x1}]}, 0xfda0}}, 0x0) [ 663.867973] netlink: 'syz-executor1': attribute type 21 has an invalid length. [ 663.927408] netlink: 'syz-executor1': attribute type 21 has an invalid length. 03:35:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b7000000020001ffbfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000014d400500000000005504000001ed00002f040000000000006f460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 03:35:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b7000000020001ffbfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000014d400500000000005504000001ed00002f040000000000006f460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 03:35:20 executing program 0: creat(&(0x7f0000000440)='./file2\x00', 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) eventfd2(0x0, 0x0) pipe2(&(0x7f0000000180), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) socket$inet6_udplite(0xa, 0x2, 0x88) umount2(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0xffffffffffffff08) getsockname$inet(0xffffffffffffffff, &(0x7f00000006c0)={0x2, 0x0, @dev}, &(0x7f00000018c0)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000400)="5ac05eeb30e042240f78708003cd94ec", 0x10) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001900)) openat$dir(0xffffffffffffff9c, &(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000540)={"6e7f1909000000000000000000000040"}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000019c0)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) 03:35:20 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x304, @dev}, 0x4, {0x2, 0x0, @multicast1}, "00000080000001000000007000"}) 03:35:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b7000000020001ffbfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000014d400500000000005504000001ed00002f040000000000006f460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 03:35:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b7000000020001ffbfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000014d400500000000005504000001ed00002f040000000000006f460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 03:35:20 executing program 0: creat(&(0x7f0000000440)='./file2\x00', 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) eventfd2(0x0, 0x0) pipe2(&(0x7f0000000180), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) socket$inet6_udplite(0xa, 0x2, 0x88) umount2(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0xffffffffffffff08) getsockname$inet(0xffffffffffffffff, &(0x7f00000006c0)={0x2, 0x0, @dev}, &(0x7f00000018c0)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000400)="5ac05eeb30e042240f78708003cd94ec", 0x10) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001900)) openat$dir(0xffffffffffffff9c, &(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000540)={"6e7f1909000000000000000000000040"}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000019c0)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) 03:35:20 executing program 2: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:22 executing program 3: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$input_event(0xffffffffffffffff, &(0x7f00000002c0)={{0x77359400}}, 0x18) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) stat(&(0x7f00000008c0)='./bus\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getgid() getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003880)) geteuid() getgroups(0x0, &(0x7f00000038c0)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000003900)='./bus\x00', &(0x7f0000003940)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000039c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003a00)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000003b00)=0xe8) getresgid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003c00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c40)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000003d40)=0xe8) getgroups(0x0, &(0x7f0000003d80)) 03:35:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b7000000020001ffbfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000014d400500000000005504000001ed00002f040000000000006f460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 03:35:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b7000000020001ffbfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000014d400500000000005504000001ed00002f040000000000006f460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 03:35:22 executing program 0: geteuid() times(&(0x7f0000000700)) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/md0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffff9c, &(0x7f0000001ac0), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001a00)=')\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/uts\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) add_key(&(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000001880), &(0x7f00000018c0)=')\x00', 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000880)=""/4096) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001b00)=""/225) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000200), &(0x7f0000000840)=0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)="637075616363742f7774617400064352715b8df7bc81e9463b", 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:35:22 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x304, @dev}, 0x4, {0x2, 0x0, @multicast1}, "00000080000001000000007000"}) 03:35:22 executing program 2: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:22 executing program 1: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b7000000020001ffbfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000014d400500000000005504000001ed00002f040000000000006f460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 03:35:22 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x304, @dev}, 0x4, {0x2, 0x0, @multicast1}, "00000080000001000000007000"}) 03:35:22 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x304, @dev}, 0x4, {0x2, 0x0, @multicast1}, "00000080000001000000007000"}) 03:35:22 executing program 1: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:22 executing program 4: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:23 executing program 1: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:23 executing program 0: geteuid() times(&(0x7f0000000700)) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/md0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffff9c, &(0x7f0000001ac0), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001a00)=')\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/uts\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) add_key(&(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000001880), &(0x7f00000018c0)=')\x00', 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000880)=""/4096) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001b00)=""/225) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000200), &(0x7f0000000840)=0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)="637075616363742f7774617400064352715b8df7bc81e9463b", 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:35:23 executing program 5: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:23 executing program 2: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:23 executing program 3: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$input_event(0xffffffffffffffff, &(0x7f00000002c0)={{0x77359400}}, 0x18) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) stat(&(0x7f00000008c0)='./bus\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getgid() getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003880)) geteuid() getgroups(0x0, &(0x7f00000038c0)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000003900)='./bus\x00', &(0x7f0000003940)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000039c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003a00)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000003b00)=0xe8) getresgid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003c00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c40)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000003d40)=0xe8) getgroups(0x0, &(0x7f0000003d80)) 03:35:23 executing program 4: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:23 executing program 5: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:24 executing program 2: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:24 executing program 3: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$input_event(0xffffffffffffffff, &(0x7f00000002c0)={{0x77359400}}, 0x18) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) stat(&(0x7f00000008c0)='./bus\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getgid() getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003880)) geteuid() getgroups(0x0, &(0x7f00000038c0)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000003900)='./bus\x00', &(0x7f0000003940)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000039c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003a00)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000003b00)=0xe8) getresgid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003c00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c40)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000003d40)=0xe8) getgroups(0x0, &(0x7f0000003d80)) 03:35:24 executing program 0: geteuid() times(&(0x7f0000000700)) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/md0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffff9c, &(0x7f0000001ac0), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001a00)=')\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/uts\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) add_key(&(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000001880), &(0x7f00000018c0)=')\x00', 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000880)=""/4096) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001b00)=""/225) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000200), &(0x7f0000000840)=0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)="637075616363742f7774617400064352715b8df7bc81e9463b", 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:35:24 executing program 1: geteuid() times(&(0x7f0000000700)) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/md0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffff9c, &(0x7f0000001ac0), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001a00)=')\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/uts\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) add_key(&(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000001880), &(0x7f00000018c0)=')\x00', 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000880)=""/4096) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001b00)=""/225) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000200), &(0x7f0000000840)=0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)="637075616363742f7774617400064352715b8df7bc81e9463b", 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:35:24 executing program 4: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:24 executing program 2: geteuid() times(&(0x7f0000000700)) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/md0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffff9c, &(0x7f0000001ac0), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001a00)=')\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/uts\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) add_key(&(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000001880), &(0x7f00000018c0)=')\x00', 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000880)=""/4096) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001b00)=""/225) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000200), &(0x7f0000000840)=0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)="637075616363742f7774617400064352715b8df7bc81e9463b", 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:35:24 executing program 5: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:25 executing program 1: geteuid() times(&(0x7f0000000700)) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/md0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffff9c, &(0x7f0000001ac0), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001a00)=')\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/uts\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) add_key(&(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000001880), &(0x7f00000018c0)=')\x00', 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000880)=""/4096) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001b00)=""/225) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000200), &(0x7f0000000840)=0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)="637075616363742f7774617400064352715b8df7bc81e9463b", 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:35:25 executing program 0: geteuid() times(&(0x7f0000000700)) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/md0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffff9c, &(0x7f0000001ac0), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001a00)=')\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/uts\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) add_key(&(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000001880), &(0x7f00000018c0)=')\x00', 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000880)=""/4096) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001b00)=""/225) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000200), &(0x7f0000000840)=0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)="637075616363742f7774617400064352715b8df7bc81e9463b", 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:35:25 executing program 4: geteuid() times(&(0x7f0000000700)) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/md0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffff9c, &(0x7f0000001ac0), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001a00)=')\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/uts\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) add_key(&(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000001880), &(0x7f00000018c0)=')\x00', 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000880)=""/4096) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001b00)=""/225) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000200), &(0x7f0000000840)=0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)="637075616363742f7774617400064352715b8df7bc81e9463b", 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:35:25 executing program 5: geteuid() times(&(0x7f0000000700)) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/md0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffff9c, &(0x7f0000001ac0), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001a00)=')\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/uts\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) add_key(&(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000001880), &(0x7f00000018c0)=')\x00', 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000880)=""/4096) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001b00)=""/225) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000200), &(0x7f0000000840)=0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)="637075616363742f7774617400064352715b8df7bc81e9463b", 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:35:25 executing program 2: geteuid() times(&(0x7f0000000700)) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/md0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffff9c, &(0x7f0000001ac0), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001a00)=')\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/uts\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) add_key(&(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000001880), &(0x7f00000018c0)=')\x00', 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000880)=""/4096) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001b00)=""/225) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000200), &(0x7f0000000840)=0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)="637075616363742f7774617400064352715b8df7bc81e9463b", 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:35:25 executing program 1: geteuid() times(&(0x7f0000000700)) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/md0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffff9c, &(0x7f0000001ac0), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001a00)=')\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/uts\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) add_key(&(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000001880), &(0x7f00000018c0)=')\x00', 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000880)=""/4096) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001b00)=""/225) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000200), &(0x7f0000000840)=0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)="637075616363742f7774617400064352715b8df7bc81e9463b", 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:35:26 executing program 4: geteuid() times(&(0x7f0000000700)) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/md0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffff9c, &(0x7f0000001ac0), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001a00)=')\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/uts\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) add_key(&(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000001880), &(0x7f00000018c0)=')\x00', 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000880)=""/4096) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001b00)=""/225) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000200), &(0x7f0000000840)=0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)="637075616363742f7774617400064352715b8df7bc81e9463b", 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:35:26 executing program 1: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:26 executing program 0: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:26 executing program 3: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:26 executing program 5: geteuid() times(&(0x7f0000000700)) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/md0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffff9c, &(0x7f0000001ac0), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001a00)=')\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/uts\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) add_key(&(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000001880), &(0x7f00000018c0)=')\x00', 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000880)=""/4096) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001b00)=""/225) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000200), &(0x7f0000000840)=0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)="637075616363742f7774617400064352715b8df7bc81e9463b", 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:35:26 executing program 2: geteuid() times(&(0x7f0000000700)) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/md0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffff9c, &(0x7f0000001ac0), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001a00)=')\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/uts\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) add_key(&(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000001880), &(0x7f00000018c0)=')\x00', 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000880)=""/4096) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001b00)=""/225) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000200), &(0x7f0000000840)=0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)="637075616363742f7774617400064352715b8df7bc81e9463b", 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:35:26 executing program 1: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:27 executing program 0: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:27 executing program 5: geteuid() times(&(0x7f0000000700)) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/md0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffff9c, &(0x7f0000001ac0), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001a00)=')\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/uts\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) add_key(&(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000001880), &(0x7f00000018c0)=')\x00', 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000880)=""/4096) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001b00)=""/225) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000200), &(0x7f0000000840)=0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)="637075616363742f7774617400064352715b8df7bc81e9463b", 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:35:27 executing program 2: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:27 executing program 4: geteuid() times(&(0x7f0000000700)) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/md0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffff9c, &(0x7f0000001ac0), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001a00)=')\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/uts\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) add_key(&(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000001880), &(0x7f00000018c0)=')\x00', 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000880)=""/4096) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001b00)=""/225) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000200), &(0x7f0000000840)=0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)="637075616363742f7774617400064352715b8df7bc81e9463b", 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:35:27 executing program 1: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:27 executing program 2: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:27 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) [ 671.555755] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1, syncid = 4, id = 0 03:35:28 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:28 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:28 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:28 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:28 executing program 0: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:28 executing program 3: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) [ 672.138595] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1, syncid = 4, id = 0 [ 672.157733] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1, syncid = 4, id = 0 03:35:28 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:28 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:28 executing program 2: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:28 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:28 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:28 executing program 2: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:29 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) [ 672.799829] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1, syncid = 4, id = 0 03:35:29 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) [ 673.069603] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1, syncid = 4, id = 0 03:35:29 executing program 3: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002080)={0x0, 0x1, 0x6, [0x81, 0x0, 0x80, 0x5, 0x0, 0x40]}, &(0x7f00000020c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002100)={r0, 0x3, 0x2}, &(0x7f0000002140)=0x8) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000140)={0x8000}) setgroups(0x1, &(0x7f0000000500)=[0x0]) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) read(r2, &(0x7f0000000540)=""/34, 0x11c) syz_read_part_table(0xd0ba, 0x1, &(0x7f0000002000)=[{&(0x7f0000001f40)="2d0b47c010c8c53bc12009311a4c93a7c81abdebb594e83d80cfe27c4b995cb221a075f91f00e7912235e3ac52d22a12da84b1b6f1bdaf051c1f504720c0c57ba4088a5ff4576597242e6896a81c05d7c1e7b93a498088206f54f58fe78f49e66920b62cdaf6e978412c785013aa1f2929323f1d002b4998e375bbac0b53b9a80b2018a4380c75c61e82748141e1c7e1f5d29972a73255d3e768d400291584dc5a5bb3237cf723ca3f896302f3d93f9237d35b972175", 0xb6, 0x1000}]) write$binfmt_aout(r4, &(0x7f00000005c0)={{0x10f, 0x4, 0x10001, 0x260, 0x240, 0x5, 0x242, 0x6}, "b9791e6ff40c08fdc67653f1e2b743d18651b87e7761a053f2a7ebd2979b99f8c8ceb606efd3cd6495f74e05aa71924dc24d700b956ee55736da9944d881148285b9f14ddc0e799495c5a9b5f3b3595ae22d9de946cd46db94c371e4e211e748b2a91fa6266787e14761e2cc69fcbe8bd986420496188d203b27a01f6a01642073538a39f7afcb1c4ed019265eb879380150251bf445229241a09bd10dbaa084377a4703e02b423c60a185e3bc810173be943feea208dcc62e224943c7edf88b9bf112666dc0927eec5072c4d2cc754e3892be2646709ebb", [[], [], [], [], [], []]}, 0x6f8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'syz_tun\x00'}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:35:29 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:29 executing program 2: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:29 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:29 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:29 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:30 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:30 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:30 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:30 executing program 2: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:30 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:30 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:30 executing program 2: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:30 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:30 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:30 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:30 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:30 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:31 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:31 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:31 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:31 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:31 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:31 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:31 executing program 2: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:31 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:31 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:31 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) [ 675.730872] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1, syncid = 4, id = 0 03:35:32 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:32 executing program 2: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:32 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000d40)='./file0\x00', 0x400, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000d80)=@abs, &(0x7f0000000e00)=0x6e, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000cc0)) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000380)) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000300), 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)=ANY=[]}}, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000ac0)) accept$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000880)=0xe8) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000e40)="42568055a07a7a69ef69dc00d990c841ff0f1837360ff3dd0f7e00c4022d9b65fee5e5c441fe124e412b74742ed9df010d64ac1e5d31a3b786e2989f7f") 03:35:32 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 03:35:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 03:35:33 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 03:35:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 03:35:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 03:35:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 03:35:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 03:35:33 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000d40)='./file0\x00', 0x400, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000d80)=@abs, &(0x7f0000000e00)=0x6e, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000cc0)) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000380)) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000300), 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)=ANY=[]}}, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000ac0)) accept$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000880)=0xe8) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000e40)="42568055a07a7a69ef69dc00d990c841ff0f1837360ff3dd0f7e00c4022d9b65fee5e5c441fe124e412b74742ed9df010d64ac1e5d31a3b786e2989f7f") 03:35:33 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:33 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d003393c957b06eec5c0100000000000000000500061c0800030099100000"], 0x1}}, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x62, @empty, 0x4e22, 0x2, 'sed\x00', 0x1, 0x2, 0x4b}, 0xe0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) getpid() tkill(r5, 0x2a) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) sendfile(r2, r2, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) 03:35:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 03:35:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 03:35:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 03:35:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 03:35:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 03:35:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 03:35:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 03:35:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 03:35:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000d40)='./file0\x00', 0x400, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000d80)=@abs, &(0x7f0000000e00)=0x6e, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000cc0)) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000380)) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000300), 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)=ANY=[]}}, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000ac0)) accept$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000880)=0xe8) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000e40)="42568055a07a7a69ef69dc00d990c841ff0f1837360ff3dd0f7e00c4022d9b65fee5e5c441fe124e412b74742ed9df010d64ac1e5d31a3b786e2989f7f") 03:35:34 executing program 5: prctl$seccomp(0x25, 0x705000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004780)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000004880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000049c0)={0x0, @rand_addr, @dev}, &(0x7f0000004a00)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000004a40)={'vcan0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000005000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005040)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000005140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005180)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000005580)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f0000005680)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0), &(0x7f0000005700)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000005740)={{{@in6=@remote, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000005840)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000005880)={0x0, @remote, @multicast2}, &(0x7f00000058c0)=0xc) getsockname(0xffffffffffffff9c, &(0x7f0000005900)=@xdp, &(0x7f0000005980)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000081c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000082c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000008300)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008340)={0x0, @local, @broadcast}, &(0x7f0000008380)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f00000083c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008400)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f00000084c0), &(0x7f0000008500)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008540)={{{@in6=@mcast2, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000008740)={'yam0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008780)={{{@in6=@mcast1, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000008880)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000088c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008900)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000eac0), 0x0, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000ecc0)={@loopback, @dev}, &(0x7f000000ed00)=0xc) 03:35:34 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:34 executing program 0: futex(&(0x7f0000000040), 0x4, 0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 03:35:35 executing program 3: keyctl$set_reqkey_keyring(0x12, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000280), 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000380), &(0x7f0000000480)=0xfffffffffffffddd) sysinfo(&(0x7f00000003c0)=""/182) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:35 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000d40)='./file0\x00', 0x400, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000d80)=@abs, &(0x7f0000000e00)=0x6e, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000cc0)) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000380)) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000300), 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)=ANY=[]}}, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000ac0)) accept$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000880)=0xe8) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000e40)="42568055a07a7a69ef69dc00d990c841ff0f1837360ff3dd0f7e00c4022d9b65fee5e5c441fe124e412b74742ed9df010d64ac1e5d31a3b786e2989f7f") 03:35:35 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000), 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4), 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000680)) gettid() 03:35:35 executing program 5: prctl$seccomp(0x25, 0x705000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004780)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000004880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000049c0)={0x0, @rand_addr, @dev}, &(0x7f0000004a00)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000004a40)={'vcan0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000005000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005040)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000005140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005180)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000005580)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f0000005680)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0), &(0x7f0000005700)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000005740)={{{@in6=@remote, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000005840)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000005880)={0x0, @remote, @multicast2}, &(0x7f00000058c0)=0xc) getsockname(0xffffffffffffff9c, &(0x7f0000005900)=@xdp, &(0x7f0000005980)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000081c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000082c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000008300)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008340)={0x0, @local, @broadcast}, &(0x7f0000008380)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f00000083c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008400)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f00000084c0), &(0x7f0000008500)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008540)={{{@in6=@mcast2, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000008740)={'yam0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008780)={{{@in6=@mcast1, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000008880)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000088c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008900)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000eac0), 0x0, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000ecc0)={@loopback, @dev}, &(0x7f000000ed00)=0xc) 03:35:35 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:35 executing program 0: futex(&(0x7f0000000040), 0x4, 0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:36 executing program 1: futex(&(0x7f0000000040), 0x4, 0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:36 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000), 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4), 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000680)) gettid() 03:35:36 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:36 executing program 5: prctl$seccomp(0x25, 0x705000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004780)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000004880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000049c0)={0x0, @rand_addr, @dev}, &(0x7f0000004a00)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000004a40)={'vcan0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000005000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005040)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000005140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005180)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000005580)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f0000005680)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0), &(0x7f0000005700)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000005740)={{{@in6=@remote, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000005840)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000005880)={0x0, @remote, @multicast2}, &(0x7f00000058c0)=0xc) getsockname(0xffffffffffffff9c, &(0x7f0000005900)=@xdp, &(0x7f0000005980)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000081c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000082c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000008300)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008340)={0x0, @local, @broadcast}, &(0x7f0000008380)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f00000083c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008400)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f00000084c0), &(0x7f0000008500)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008540)={{{@in6=@mcast2, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000008740)={'yam0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008780)={{{@in6=@mcast1, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000008880)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000088c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008900)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000eac0), 0x0, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000ecc0)={@loopback, @dev}, &(0x7f000000ed00)=0xc) 03:35:36 executing program 0: futex(&(0x7f0000000040), 0x4, 0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:37 executing program 1: futex(&(0x7f0000000040), 0x4, 0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:37 executing program 0: futex(&(0x7f0000000040), 0x4, 0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:37 executing program 3: keyctl$set_reqkey_keyring(0x12, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000280), 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000380), &(0x7f0000000480)=0xfffffffffffffddd) sysinfo(&(0x7f00000003c0)=""/182) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:37 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000), 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4), 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000680)) gettid() 03:35:37 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:37 executing program 5: prctl$seccomp(0x25, 0x705000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004780)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000004880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000049c0)={0x0, @rand_addr, @dev}, &(0x7f0000004a00)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000004a40)={'vcan0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000005000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005040)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000005140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005180)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000005580)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f0000005680)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0), &(0x7f0000005700)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000005740)={{{@in6=@remote, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000005840)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000005880)={0x0, @remote, @multicast2}, &(0x7f00000058c0)=0xc) getsockname(0xffffffffffffff9c, &(0x7f0000005900)=@xdp, &(0x7f0000005980)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000081c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000082c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000008300)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008340)={0x0, @local, @broadcast}, &(0x7f0000008380)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f00000083c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008400)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f00000084c0), &(0x7f0000008500)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008540)={{{@in6=@mcast2, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000008740)={'yam0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008780)={{{@in6=@mcast1, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000008880)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000088c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008900)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000eac0), 0x0, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000ecc0)={@loopback, @dev}, &(0x7f000000ed00)=0xc) 03:35:37 executing program 1: futex(&(0x7f0000000040), 0x4, 0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:38 executing program 4: futex(&(0x7f0000000200), 0xfffffffffffffffb, 0x0, &(0x7f0000000080), &(0x7f0000000240), 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000340)=""/165) getcwd(&(0x7f0000000400)=""/233, 0xe9) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0876969ef69dc00d990c841ff0f183745d9f70f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:38 executing program 1: socket(0x20002000000010, 0x802, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) getpid() getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000380)) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0xffffffffffffffff) getpgid(0x0) getpgrp(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x48a) dup(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') 03:35:38 executing program 0: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x24e, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:38 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000), 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4), 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000680)) gettid() 03:35:38 executing program 5: clock_gettime(0x5, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000400), &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000b00)=ANY=[], &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:39 executing program 1: socket(0x20002000000010, 0x802, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) getpid() getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000380)) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0xffffffffffffffff) getpgid(0x0) getpgrp(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x48a) dup(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') 03:35:39 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:40 executing program 3: keyctl$set_reqkey_keyring(0x12, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000280), 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000380), &(0x7f0000000480)=0xfffffffffffffddd) sysinfo(&(0x7f00000003c0)=""/182) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:40 executing program 5: clock_gettime(0x5, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000400), &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000b00)=ANY=[], &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:40 executing program 0: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x24e, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:40 executing program 4: futex(&(0x7f0000000200), 0xfffffffffffffffb, 0x0, &(0x7f0000000080), &(0x7f0000000240), 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000340)=""/165) getcwd(&(0x7f0000000400)=""/233, 0xe9) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0876969ef69dc00d990c841ff0f183745d9f70f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:40 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:40 executing program 1: socket(0x20002000000010, 0x802, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) getpid() getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000380)) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0xffffffffffffffff) getpgid(0x0) getpgrp(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x48a) dup(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') 03:35:41 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:41 executing program 4: futex(&(0x7f0000000200), 0xfffffffffffffffb, 0x0, &(0x7f0000000080), &(0x7f0000000240), 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000340)=""/165) getcwd(&(0x7f0000000400)=""/233, 0xe9) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0876969ef69dc00d990c841ff0f183745d9f70f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:41 executing program 5: clock_gettime(0x5, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000400), &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000b00)=ANY=[], &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:41 executing program 1: socket(0x20002000000010, 0x802, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) getpid() getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000380)) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0xffffffffffffffff) getpgid(0x0) getpgrp(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x48a) dup(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') 03:35:41 executing program 0: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x24e, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:41 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:43 executing program 3: keyctl$set_reqkey_keyring(0x12, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000280), 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000380), &(0x7f0000000480)=0xfffffffffffffddd) sysinfo(&(0x7f00000003c0)=""/182) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:43 executing program 4: futex(&(0x7f0000000200), 0xfffffffffffffffb, 0x0, &(0x7f0000000080), &(0x7f0000000240), 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000340)=""/165) getcwd(&(0x7f0000000400)=""/233, 0xe9) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0876969ef69dc00d990c841ff0f183745d9f70f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:43 executing program 0: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x24e, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:43 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:43 executing program 1: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:43 executing program 5: clock_gettime(0x5, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000400), &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000b00)=ANY=[], &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:43 executing program 1: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:44 executing program 0: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:44 executing program 4: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:44 executing program 5: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:44 executing program 1: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:44 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:45 executing program 3: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:45 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x24e, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:45 executing program 5: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:45 executing program 4: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:45 executing program 0: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:45 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:46 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x24e, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:46 executing program 5: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:46 executing program 0: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:46 executing program 4: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:47 executing program 2: clock_gettime(0x5, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000400), &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000b00)=ANY=[], &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:47 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x24e, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0x10, 0x4, 0x4, 0x204}, 0x2c) 03:35:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) socket$inet6(0xa, 0x0, 0x7) 03:35:48 executing program 0: clock_gettime(0x7fffffffffffffe, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast2, @local}, 0xc) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) dup(0xffffffffffffffff) 03:35:48 executing program 3: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000002c0)={0x0, @speck128, 0x0, "7097d7bf942d4222"}) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(&(0x7f0000000240)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000280)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:48 executing program 2: clock_gettime(0x5, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000400), &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000b00)=ANY=[], &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0x10, 0x4, 0x4, 0x204}, 0x2c) 03:35:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0x10, 0x4, 0x4, 0x204}, 0x2c) 03:35:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0x10, 0x4, 0x4, 0x204}, 0x2c) 03:35:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000002c0)={0x0, @speck128, 0x0, "7097d7bf942d4222"}) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(&(0x7f0000000240)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000280)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) socket$inet6(0xa, 0x0, 0x7) 03:35:49 executing program 0: clock_gettime(0x7fffffffffffffe, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast2, @local}, 0xc) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) dup(0xffffffffffffffff) 03:35:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) socket$inet6(0xa, 0x0, 0x7) 03:35:50 executing program 3: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x74, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 03:35:50 executing program 2: clock_gettime(0x5, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000400), &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000b00)=ANY=[], &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) socket$inet6(0xa, 0x0, 0x7) 03:35:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000002c0)={0x0, @speck128, 0x0, "7097d7bf942d4222"}) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(&(0x7f0000000240)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000280)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) socket$inet6(0xa, 0x0, 0x7) 03:35:50 executing program 0: clock_gettime(0x7fffffffffffffe, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast2, @local}, 0xc) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) dup(0xffffffffffffffff) 03:35:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000002c0)={0x0, @speck128, 0x0, "7097d7bf942d4222"}) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(&(0x7f0000000240)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000280)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) socket$inet6(0xa, 0x0, 0x7) 03:35:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) socket$inet6(0xa, 0x0, 0x7) 03:35:51 executing program 0: clock_gettime(0x7fffffffffffffe, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast2, @local}, 0xc) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) dup(0xffffffffffffffff) 03:35:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) socket$inet6(0xa, 0x0, 0x7) 03:35:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) socket$inet6(0xa, 0x0, 0x7) 03:35:52 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000d1df52)=""/174) 03:35:52 executing program 1: getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') creat(&(0x7f00000001c0)='./file0/file0/file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000cc0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x20000a80, 0x0, 0x0, 0x20000ab0, 0x20000c38], 0x0, &(0x7f0000000a40), &(0x7f0000000a80)=[{}, {}, {0x0, '\x00', 0x1}]}, 0x108) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[]}}, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500), &(0x7f0000000880), 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000940)='user\x00', &(0x7f0000000980), &(0x7f00000009c0)='\x00', 0xfffffffffffffffa) keyctl$search(0xa, 0x0, &(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580), 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000480)) stat(&(0x7f0000000600)='./file0/file0/file0\x00', &(0x7f0000000640)) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000001740)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000700)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:35:52 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000003b80)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000001840)=""/18, 0x12}, &(0x7f0000003b00)=[{&(0x7f0000002ac0)=""/4096, 0x20004000}, {&(0x7f0000003ac0)=""/41, 0x29}], 0x2}}], 0x48}, 0x0) 03:35:52 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) socket$inet6(0xa, 0x0, 0x7) 03:35:52 executing program 3: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000b5e6bdbed0770cf084fe1f5bc52cac82a1a3ca3a0c23c6af4b43"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="2a000000290100"], 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}]}}) open$dir(&(0x7f00000013c0)='./file0\x00', 0x8000a0, 0x0) 03:35:52 executing program 0: iopl(0x2) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0), 0x4) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4e19086d90dba8fc9c90feefa4e2179fbe5e565f247af0f2e1ac4010d64ac1e5d31a3b706f08024030866430ff5e04b") 03:35:52 executing program 1: getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') creat(&(0x7f00000001c0)='./file0/file0/file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000cc0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x20000a80, 0x0, 0x0, 0x20000ab0, 0x20000c38], 0x0, &(0x7f0000000a40), &(0x7f0000000a80)=[{}, {}, {0x0, '\x00', 0x1}]}, 0x108) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[]}}, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500), &(0x7f0000000880), 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000940)='user\x00', &(0x7f0000000980), &(0x7f00000009c0)='\x00', 0xfffffffffffffffa) keyctl$search(0xa, 0x0, &(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580), 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000480)) stat(&(0x7f0000000600)='./file0/file0/file0\x00', &(0x7f0000000640)) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000001740)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000700)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:35:52 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000003b80)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000001840)=""/18, 0x12}, &(0x7f0000003b00)=[{&(0x7f0000002ac0)=""/4096, 0x20004000}, {&(0x7f0000003ac0)=""/41, 0x29}], 0x2}}], 0x48}, 0x0) 03:35:52 executing program 1: getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') creat(&(0x7f00000001c0)='./file0/file0/file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000cc0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x20000a80, 0x0, 0x0, 0x20000ab0, 0x20000c38], 0x0, &(0x7f0000000a40), &(0x7f0000000a80)=[{}, {}, {0x0, '\x00', 0x1}]}, 0x108) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[]}}, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500), &(0x7f0000000880), 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000940)='user\x00', &(0x7f0000000980), &(0x7f00000009c0)='\x00', 0xfffffffffffffffa) keyctl$search(0xa, 0x0, &(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580), 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000480)) stat(&(0x7f0000000600)='./file0/file0/file0\x00', &(0x7f0000000640)) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000001740)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000700)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:35:52 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000d1df52)=""/174) 03:35:52 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000003b80)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000001840)=""/18, 0x12}, &(0x7f0000003b00)=[{&(0x7f0000002ac0)=""/4096, 0x20004000}, {&(0x7f0000003ac0)=""/41, 0x29}], 0x2}}], 0x48}, 0x0) 03:35:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000d1df52)=""/174) 03:35:52 executing program 1: getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') creat(&(0x7f00000001c0)='./file0/file0/file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000cc0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x20000a80, 0x0, 0x0, 0x20000ab0, 0x20000c38], 0x0, &(0x7f0000000a40), &(0x7f0000000a80)=[{}, {}, {0x0, '\x00', 0x1}]}, 0x108) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[]}}, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500), &(0x7f0000000880), 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000940)='user\x00', &(0x7f0000000980), &(0x7f00000009c0)='\x00', 0xfffffffffffffffa) keyctl$search(0xa, 0x0, &(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580), 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000480)) stat(&(0x7f0000000600)='./file0/file0/file0\x00', &(0x7f0000000640)) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000001740)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000700)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:35:52 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000003b80)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000001840)=""/18, 0x12}, &(0x7f0000003b00)=[{&(0x7f0000002ac0)=""/4096, 0x20004000}, {&(0x7f0000003ac0)=""/41, 0x29}], 0x2}}], 0x48}, 0x0) 03:35:52 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000d1df52)=""/174) 03:35:52 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000003b80)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000001840)=""/18, 0x12}, &(0x7f0000003b00)=[{&(0x7f0000002ac0)=""/4096, 0x20004000}, {&(0x7f0000003ac0)=""/41, 0x29}], 0x2}}], 0x48}, 0x0) 03:35:53 executing program 3: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000b5e6bdbed0770cf084fe1f5bc52cac82a1a3ca3a0c23c6af4b43"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="2a000000290100"], 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}]}}) open$dir(&(0x7f00000013c0)='./file0\x00', 0x8000a0, 0x0) 03:35:53 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000003b80)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000001840)=""/18, 0x12}, &(0x7f0000003b00)=[{&(0x7f0000002ac0)=""/4096, 0x20004000}, {&(0x7f0000003ac0)=""/41, 0x29}], 0x2}}], 0x48}, 0x0) 03:35:53 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000003b80)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000001840)=""/18, 0x12}, &(0x7f0000003b00)=[{&(0x7f0000002ac0)=""/4096, 0x20004000}, {&(0x7f0000003ac0)=""/41, 0x29}], 0x2}}], 0x48}, 0x0) 03:35:53 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000d1df52)=""/174) 03:35:53 executing program 0: iopl(0x2) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0), 0x4) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4e19086d90dba8fc9c90feefa4e2179fbe5e565f247af0f2e1ac4010d64ac1e5d31a3b706f08024030866430ff5e04b") 03:35:53 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000d1df52)=""/174) 03:35:53 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000003b80)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000001840)=""/18, 0x12}, &(0x7f0000003b00)=[{&(0x7f0000002ac0)=""/4096, 0x20004000}, {&(0x7f0000003ac0)=""/41, 0x29}], 0x2}}], 0x48}, 0x0) 03:35:53 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000b5e6bdbed0770cf084fe1f5bc52cac82a1a3ca3a0c23c6af4b43"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="2a000000290100"], 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}]}}) open$dir(&(0x7f00000013c0)='./file0\x00', 0x8000a0, 0x0) 03:35:53 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000003b80)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000001840)=""/18, 0x12}, &(0x7f0000003b00)=[{&(0x7f0000002ac0)=""/4096, 0x20004000}, {&(0x7f0000003ac0)=""/41, 0x29}], 0x2}}], 0x48}, 0x0) 03:35:53 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000b5e6bdbed0770cf084fe1f5bc52cac82a1a3ca3a0c23c6af4b43"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="2a000000290100"], 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}]}}) open$dir(&(0x7f00000013c0)='./file0\x00', 0x8000a0, 0x0) 03:35:53 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000d1df52)=""/174) 03:35:53 executing program 5: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000b5e6bdbed0770cf084fe1f5bc52cac82a1a3ca3a0c23c6af4b43"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="2a000000290100"], 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}]}}) open$dir(&(0x7f00000013c0)='./file0\x00', 0x8000a0, 0x0) 03:35:53 executing program 3: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000b5e6bdbed0770cf084fe1f5bc52cac82a1a3ca3a0c23c6af4b43"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="2a000000290100"], 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}]}}) open$dir(&(0x7f00000013c0)='./file0\x00', 0x8000a0, 0x0) 03:35:53 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000003b80)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000001840)=""/18, 0x12}, &(0x7f0000003b00)=[{&(0x7f0000002ac0)=""/4096, 0x20004000}, {&(0x7f0000003ac0)=""/41, 0x29}], 0x2}}], 0x48}, 0x0) 03:35:54 executing program 0: iopl(0x2) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0), 0x4) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4e19086d90dba8fc9c90feefa4e2179fbe5e565f247af0f2e1ac4010d64ac1e5d31a3b706f08024030866430ff5e04b") 03:35:54 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000b5e6bdbed0770cf084fe1f5bc52cac82a1a3ca3a0c23c6af4b43"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="2a000000290100"], 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}]}}) open$dir(&(0x7f00000013c0)='./file0\x00', 0x8000a0, 0x0) 03:35:54 executing program 5: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000b5e6bdbed0770cf084fe1f5bc52cac82a1a3ca3a0c23c6af4b43"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="2a000000290100"], 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}]}}) open$dir(&(0x7f00000013c0)='./file0\x00', 0x8000a0, 0x0) 03:35:54 executing program 4: getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') creat(&(0x7f00000001c0)='./file0/file0/file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000cc0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x20000a80, 0x0, 0x0, 0x20000ab0, 0x20000c38], 0x0, &(0x7f0000000a40), &(0x7f0000000a80)=[{}, {}, {0x0, '\x00', 0x1}]}, 0x108) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[]}}, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500), &(0x7f0000000880), 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000940)='user\x00', &(0x7f0000000980), &(0x7f00000009c0)='\x00', 0xfffffffffffffffa) keyctl$search(0xa, 0x0, &(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580), 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000480)) stat(&(0x7f0000000600)='./file0/file0/file0\x00', &(0x7f0000000640)) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000001740)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000700)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:35:54 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x200003, 0x0) accept(0xffffffffffffff9c, &(0x7f00000005c0)=@xdp, &(0x7f0000000640)=0x80) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000580)=""/59, 0x3b, 0x0, &(0x7f0000000680), 0x14) clock_getres(0x0, &(0x7f00000003c0)) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000780), &(0x7f00000007c0)='\x00', 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000800)='keyring\x00', &(0x7f0000000a00)='/dev/full\x00') keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x0, 0x2000, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000008c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x20000000000001af, &(0x7f00000004c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000004c0)}) pipe2(&(0x7f00000009c0), 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) pipe(&(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="f5428055a0727269ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5c4015dd8144af2ed2e1a1a3ef0f6585aab550101a3b786e298edc4227992749f55") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000900), &(0x7f0000000940)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000980), 0x8) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000006c0)=0xffffffffffffff8c) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), 0xc) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000440), 0xb) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000880)) getpgid(0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffffd) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) 03:35:54 executing program 3: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000b5e6bdbed0770cf084fe1f5bc52cac82a1a3ca3a0c23c6af4b43"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="2a000000290100"], 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}]}}) open$dir(&(0x7f00000013c0)='./file0\x00', 0x8000a0, 0x0) 03:35:54 executing program 5: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000b5e6bdbed0770cf084fe1f5bc52cac82a1a3ca3a0c23c6af4b43"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="2a000000290100"], 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}]}}) open$dir(&(0x7f00000013c0)='./file0\x00', 0x8000a0, 0x0) 03:35:54 executing program 1: madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:35:54 executing program 4: getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') creat(&(0x7f00000001c0)='./file0/file0/file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000cc0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x20000a80, 0x0, 0x0, 0x20000ab0, 0x20000c38], 0x0, &(0x7f0000000a40), &(0x7f0000000a80)=[{}, {}, {0x0, '\x00', 0x1}]}, 0x108) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[]}}, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500), &(0x7f0000000880), 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000940)='user\x00', &(0x7f0000000980), &(0x7f00000009c0)='\x00', 0xfffffffffffffffa) keyctl$search(0xa, 0x0, &(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580), 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000480)) stat(&(0x7f0000000600)='./file0/file0/file0\x00', &(0x7f0000000640)) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000001740)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000700)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:35:54 executing program 5: recvmsg(0xffffffffffffff9c, &(0x7f0000000580)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)=""/243, 0xf3}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@remote, @in6=@local}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005300), 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000055c0)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000056c0)={'veth0_to_team\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007680)={0x0, @rand_addr, @multicast2}, &(0x7f00000076c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007700)={{{@in6=@ipv4={[], [], @broadcast}, @in=@remote}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000007800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007900)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:54 executing program 4: getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') creat(&(0x7f00000001c0)='./file0/file0/file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000cc0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x20000a80, 0x0, 0x0, 0x20000ab0, 0x20000c38], 0x0, &(0x7f0000000a40), &(0x7f0000000a80)=[{}, {}, {0x0, '\x00', 0x1}]}, 0x108) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[]}}, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500), &(0x7f0000000880), 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000940)='user\x00', &(0x7f0000000980), &(0x7f00000009c0)='\x00', 0xfffffffffffffffa) keyctl$search(0xa, 0x0, &(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580), 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000480)) stat(&(0x7f0000000600)='./file0/file0/file0\x00', &(0x7f0000000640)) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000001740)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000700)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:35:54 executing program 4: mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) gettid() ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"}) semget$private(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f0000000740)) 03:35:55 executing program 0: iopl(0x2) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0), 0x4) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4e19086d90dba8fc9c90feefa4e2179fbe5e565f247af0f2e1ac4010d64ac1e5d31a3b706f08024030866430ff5e04b") 03:35:55 executing program 1: madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:35:55 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x200003, 0x0) accept(0xffffffffffffff9c, &(0x7f00000005c0)=@xdp, &(0x7f0000000640)=0x80) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000580)=""/59, 0x3b, 0x0, &(0x7f0000000680), 0x14) clock_getres(0x0, &(0x7f00000003c0)) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000780), &(0x7f00000007c0)='\x00', 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000800)='keyring\x00', &(0x7f0000000a00)='/dev/full\x00') keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x0, 0x2000, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000008c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x20000000000001af, &(0x7f00000004c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000004c0)}) pipe2(&(0x7f00000009c0), 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) pipe(&(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="f5428055a0727269ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5c4015dd8144af2ed2e1a1a3ef0f6585aab550101a3b786e298edc4227992749f55") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000900), &(0x7f0000000940)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000980), 0x8) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000006c0)=0xffffffffffffff8c) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), 0xc) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000440), 0xb) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000880)) getpgid(0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffffd) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) 03:35:55 executing program 5: recvmsg(0xffffffffffffff9c, &(0x7f0000000580)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)=""/243, 0xf3}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@remote, @in6=@local}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005300), 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000055c0)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000056c0)={'veth0_to_team\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007680)={0x0, @rand_addr, @multicast2}, &(0x7f00000076c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007700)={{{@in6=@ipv4={[], [], @broadcast}, @in=@remote}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000007800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007900)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:55 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x200003, 0x0) accept(0xffffffffffffff9c, &(0x7f00000005c0)=@xdp, &(0x7f0000000640)=0x80) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000580)=""/59, 0x3b, 0x0, &(0x7f0000000680), 0x14) clock_getres(0x0, &(0x7f00000003c0)) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000780), &(0x7f00000007c0)='\x00', 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000800)='keyring\x00', &(0x7f0000000a00)='/dev/full\x00') keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x0, 0x2000, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000008c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x20000000000001af, &(0x7f00000004c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000004c0)}) pipe2(&(0x7f00000009c0), 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) pipe(&(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="f5428055a0727269ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5c4015dd8144af2ed2e1a1a3ef0f6585aab550101a3b786e298edc4227992749f55") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000900), &(0x7f0000000940)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000980), 0x8) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000006c0)=0xffffffffffffff8c) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), 0xc) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000440), 0xb) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000880)) getpgid(0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffffd) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) 03:35:55 executing program 4: mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) gettid() ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"}) semget$private(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f0000000740)) 03:35:56 executing program 1: madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:35:56 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x200003, 0x0) accept(0xffffffffffffff9c, &(0x7f00000005c0)=@xdp, &(0x7f0000000640)=0x80) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000580)=""/59, 0x3b, 0x0, &(0x7f0000000680), 0x14) clock_getres(0x0, &(0x7f00000003c0)) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000780), &(0x7f00000007c0)='\x00', 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000800)='keyring\x00', &(0x7f0000000a00)='/dev/full\x00') keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x0, 0x2000, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000008c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x20000000000001af, &(0x7f00000004c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000004c0)}) pipe2(&(0x7f00000009c0), 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) pipe(&(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="f5428055a0727269ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5c4015dd8144af2ed2e1a1a3ef0f6585aab550101a3b786e298edc4227992749f55") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000900), &(0x7f0000000940)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000980), 0x8) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000006c0)=0xffffffffffffff8c) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), 0xc) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000440), 0xb) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000880)) getpgid(0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffffd) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) 03:35:56 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:35:56 executing program 5: recvmsg(0xffffffffffffff9c, &(0x7f0000000580)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)=""/243, 0xf3}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@remote, @in6=@local}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005300), 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000055c0)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000056c0)={'veth0_to_team\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007680)={0x0, @rand_addr, @multicast2}, &(0x7f00000076c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007700)={{{@in6=@ipv4={[], [], @broadcast}, @in=@remote}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000007800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007900)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:56 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:35:56 executing program 4: mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) gettid() ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"}) semget$private(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f0000000740)) 03:35:56 executing program 1: madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:35:57 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:35:57 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x200003, 0x0) accept(0xffffffffffffff9c, &(0x7f00000005c0)=@xdp, &(0x7f0000000640)=0x80) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000580)=""/59, 0x3b, 0x0, &(0x7f0000000680), 0x14) clock_getres(0x0, &(0x7f00000003c0)) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000780), &(0x7f00000007c0)='\x00', 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000800)='keyring\x00', &(0x7f0000000a00)='/dev/full\x00') keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x0, 0x2000, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000008c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x20000000000001af, &(0x7f00000004c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000004c0)}) pipe2(&(0x7f00000009c0), 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) pipe(&(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="f5428055a0727269ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5c4015dd8144af2ed2e1a1a3ef0f6585aab550101a3b786e298edc4227992749f55") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000900), &(0x7f0000000940)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000980), 0x8) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000006c0)=0xffffffffffffff8c) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), 0xc) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000440), 0xb) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000880)) getpgid(0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffffd) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) 03:35:57 executing program 5: recvmsg(0xffffffffffffff9c, &(0x7f0000000580)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)=""/243, 0xf3}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@remote, @in6=@local}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005300), 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000055c0)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000056c0)={'veth0_to_team\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007680)={0x0, @rand_addr, @multicast2}, &(0x7f00000076c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007700)={{{@in6=@ipv4={[], [], @broadcast}, @in=@remote}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000007800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007900)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:59 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x200003, 0x0) accept(0xffffffffffffff9c, &(0x7f00000005c0)=@xdp, &(0x7f0000000640)=0x80) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000580)=""/59, 0x3b, 0x0, &(0x7f0000000680), 0x14) clock_getres(0x0, &(0x7f00000003c0)) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000780), &(0x7f00000007c0)='\x00', 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000800)='keyring\x00', &(0x7f0000000a00)='/dev/full\x00') keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x0, 0x2000, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000008c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x20000000000001af, &(0x7f00000004c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000004c0)}) pipe2(&(0x7f00000009c0), 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) pipe(&(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="f5428055a0727269ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5c4015dd8144af2ed2e1a1a3ef0f6585aab550101a3b786e298edc4227992749f55") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000900), &(0x7f0000000940)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000980), 0x8) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000006c0)=0xffffffffffffff8c) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), 0xc) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000440), 0xb) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000880)) getpgid(0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffffd) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) 03:35:59 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:35:59 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:35:59 executing program 4: mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) gettid() ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"}) semget$private(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f0000000740)) 03:35:59 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:35:59 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:35:59 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:35:59 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:35:59 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:35:59 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:35:59 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:35:59 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:36:00 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x200003, 0x0) accept(0xffffffffffffff9c, &(0x7f00000005c0)=@xdp, &(0x7f0000000640)=0x80) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000580)=""/59, 0x3b, 0x0, &(0x7f0000000680), 0x14) clock_getres(0x0, &(0x7f00000003c0)) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000780), &(0x7f00000007c0)='\x00', 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000800)='keyring\x00', &(0x7f0000000a00)='/dev/full\x00') keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x0, 0x2000, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000008c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x20000000000001af, &(0x7f00000004c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000004c0)}) pipe2(&(0x7f00000009c0), 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) pipe(&(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="f5428055a0727269ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5c4015dd8144af2ed2e1a1a3ef0f6585aab550101a3b786e298edc4227992749f55") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000900), &(0x7f0000000940)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000980), 0x8) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000006c0)=0xffffffffffffff8c) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), 0xc) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000440), 0xb) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000880)) getpgid(0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffffd) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) 03:36:00 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:36:00 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:36:00 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:36:00 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:36:00 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:36:00 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:36:00 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:36:00 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) [ 704.525690] ================================================================== [ 704.533249] BUG: KASAN: use-after-free in fuse_dev_do_read.isra.27+0x1659/0x1920 [ 704.540788] Read of size 8 at addr ffff8801cbd4ea30 by task syz-executor0/28821 [ 704.548230] [ 704.549851] CPU: 1 PID: 28821 Comm: syz-executor0 Not tainted 4.19.0-rc3+ #11 [ 704.557115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.566463] Call Trace: [ 704.569106] dump_stack+0x1c4/0x2b4 [ 704.572728] ? dump_stack_print_info.cold.2+0x52/0x52 [ 704.577905] ? printk+0xa7/0xcf [ 704.581173] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 704.585938] print_address_description.cold.8+0x9/0x1ff [ 704.591294] kasan_report.cold.9+0x242/0x309 [ 704.595687] ? fuse_dev_do_read.isra.27+0x1659/0x1920 [ 704.600866] __asan_report_load8_noabort+0x14/0x20 [ 704.605792] fuse_dev_do_read.isra.27+0x1659/0x1920 [ 704.610802] ? fuse_dev_release+0x780/0x780 [ 704.615135] ? finish_wait+0x430/0x430 [ 704.619026] ? futex_wait_setup+0x3e0/0x3e0 [ 704.623349] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 704.628545] ? drop_futex_key_refs.isra.15+0x6d/0xe0 [ 704.633639] ? futex_wake+0x304/0x760 [ 704.637438] ? trace_hardirqs_off+0x310/0x310 [ 704.641940] ? __fget+0x4aa/0x740 [ 704.645394] ? check_preemption_disabled+0x48/0x200 [ 704.650415] ? kasan_check_read+0x11/0x20 [ 704.654579] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 704.659858] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 704.664653] ? lockdep_hardirqs_on+0x421/0x5c0 [ 704.669264] ? retint_kernel+0x2d/0x2d [ 704.673155] ? trace_hardirqs_on_caller+0xc0/0x310 [ 704.678091] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 704.682834] ? memset+0x31/0x40 [ 704.686113] fuse_dev_read+0x1a9/0x250 [ 704.690013] ? fuse_dev_splice_read+0x840/0x840 [ 704.694712] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 704.700258] ? iov_iter_init+0xc2/0x1e0 [ 704.704227] __vfs_read+0x6ac/0x9b0 [ 704.707846] ? vfs_copy_file_range+0xb90/0xb90 [ 704.712443] ? fsnotify+0x1330/0x1330 [ 704.716247] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 704.720996] ? rw_verify_area+0x118/0x360 03:36:01 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) [ 704.725145] vfs_read+0x17f/0x3c0 [ 704.728594] ksys_read+0x101/0x260 [ 704.732133] ? kernel_write+0x120/0x120 [ 704.736126] __x64_sys_read+0x73/0xb0 [ 704.739935] ? do_syscall_64+0xca/0x820 [ 704.743915] do_syscall_64+0x1b9/0x820 [ 704.747810] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 704.753184] ? syscall_return_slowpath+0x5e0/0x5e0 [ 704.758127] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 704.762987] ? trace_hardirqs_on_caller+0x310/0x310 [ 704.768014] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 704.773036] ? prepare_exit_to_usermode+0x291/0x3b0 [ 704.773071] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 704.773096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.773108] RIP: 0033:0x4572d9 [ 704.773122] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 704.773130] RSP: 002b:00007faaeefe4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 704.773151] RAX: ffffffffffffffda RBX: 00007faaeefe56d4 RCX: 00000000004572d9 [ 704.773158] RDX: 0000000000001000 RSI: 00000000200040c0 RDI: 0000000000000003 [ 704.773165] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 704.773173] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 704.773181] R13: 00000000004d4508 R14: 00000000004c8d44 R15: 0000000000000000 [ 704.810427] [ 704.810437] Allocated by task 28825: [ 704.810452] save_stack+0x43/0xd0 [ 704.810464] kasan_kmalloc+0xc7/0xe0 [ 704.810477] kasan_slab_alloc+0x12/0x20 [ 704.810492] kmem_cache_alloc+0x12e/0x730 [ 704.810507] __fuse_request_alloc+0x27/0xf0 [ 704.810526] __fuse_get_req+0x1f7/0x9e0 [ 704.825585] fuse_simple_request+0x28/0x730 [ 704.825598] fuse_statfs+0x368/0x8a0 [ 704.825615] statfs_by_dentry+0x136/0x210 [ 704.825635] vfs_statfs+0x47/0x2e0 [ 704.825650] user_statfs+0xbd/0x150 [ 704.825664] __do_sys_statfs+0x7f/0xf0 [ 704.825678] __x64_sys_statfs+0x54/0x80 [ 704.825693] do_syscall_64+0x1b9/0x820 [ 704.825707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.825711] [ 704.825718] Freed by task 28825: [ 704.825734] save_stack+0x43/0xd0 [ 704.840256] __kasan_slab_free+0x102/0x150 [ 704.840268] kasan_slab_free+0xe/0x10 [ 704.840282] kmem_cache_free+0x83/0x290 [ 704.840296] fuse_request_free+0x8b/0xa0 [ 704.840310] fuse_put_request+0x2a6/0x350 [ 704.840324] fuse_simple_request+0x453/0x730 [ 704.840336] fuse_statfs+0x368/0x8a0 [ 704.840350] statfs_by_dentry+0x136/0x210 [ 704.840364] vfs_statfs+0x47/0x2e0 [ 704.840377] user_statfs+0xbd/0x150 [ 704.840390] __do_sys_statfs+0x7f/0xf0 [ 704.840408] __x64_sys_statfs+0x54/0x80 [ 704.975609] do_syscall_64+0x1b9/0x820 [ 704.979506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.984685] [ 704.986315] The buggy address belongs to the object at ffff8801cbd4ea00 [ 704.986315] which belongs to the cache fuse_request of size 448 [ 704.999068] The buggy address is located 48 bytes inside of [ 704.999068] 448-byte region [ffff8801cbd4ea00, ffff8801cbd4ebc0) [ 705.010852] The buggy address belongs to the page: [ 705.015780] page:ffffea00072f5380 count:1 mapcount:0 mapping:ffff8801d4ad4840 index:0x0 [ 705.023921] flags: 0x2fffc0000000100(slab) [ 705.028161] raw: 02fffc0000000100 ffffea000717eb48 ffff8801d4ad5c48 ffff8801d4ad4840 [ 705.036042] raw: 0000000000000000 ffff8801cbd4e000 0000000100000008 0000000000000000 [ 705.043923] page dumped because: kasan: bad access detected [ 705.049623] [ 705.051246] Memory state around the buggy address: [ 705.056173] ffff8801cbd4e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 705.063531] ffff8801cbd4e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 705.070887] >ffff8801cbd4ea00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 705.078245] ^ [ 705.083176] ffff8801cbd4ea80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 705.090533] ffff8801cbd4eb00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 705.097881] ================================================================== [ 705.105232] Disabling lock debugging due to kernel taint 03:36:01 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) 03:36:01 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) [ 705.127196] Kernel panic - not syncing: panic_on_warn set ... [ 705.127196] [ 705.134590] CPU: 1 PID: 28821 Comm: syz-executor0 Tainted: G B 4.19.0-rc3+ #11 [ 705.143248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.152604] Call Trace: [ 705.155202] dump_stack+0x1c4/0x2b4 [ 705.158834] ? dump_stack_print_info.cold.2+0x52/0x52 [ 705.164037] panic+0x238/0x4e7 [ 705.167254] ? add_taint.cold.5+0x16/0x16 [ 705.171475] ? preempt_schedule+0x4d/0x60 [ 705.175647] ? ___preempt_schedule+0x16/0x18 [ 705.180058] ? trace_hardirqs_on+0xb4/0x310 [ 705.184387] kasan_end_report+0x47/0x4f [ 705.188346] kasan_report.cold.9+0x76/0x309 [ 705.192660] ? fuse_dev_do_read.isra.27+0x1659/0x1920 [ 705.197832] __asan_report_load8_noabort+0x14/0x20 [ 705.202744] fuse_dev_do_read.isra.27+0x1659/0x1920 [ 705.207748] ? fuse_dev_release+0x780/0x780 [ 705.212073] ? finish_wait+0x430/0x430 [ 705.215951] ? futex_wait_setup+0x3e0/0x3e0 [ 705.220256] ? __sanitizer_cov_trace_switch+0x53/0x90 03:36:01 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) [ 705.225449] ? drop_futex_key_refs.isra.15+0x6d/0xe0 [ 705.230563] ? futex_wake+0x304/0x760 [ 705.234378] ? trace_hardirqs_off+0x310/0x310 [ 705.238871] ? __fget+0x4aa/0x740 [ 705.242313] ? check_preemption_disabled+0x48/0x200 [ 705.247328] ? kasan_check_read+0x11/0x20 [ 705.251461] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 705.256735] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 705.261491] ? lockdep_hardirqs_on+0x421/0x5c0 [ 705.266054] ? retint_kernel+0x2d/0x2d [ 705.269934] ? trace_hardirqs_on_caller+0xc0/0x310 03:36:01 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xfff, 0x2, 0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getegid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x3f, 0x70000000}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}}, 0x60) [ 705.274847] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 705.279593] ? memset+0x31/0x40 [ 705.282876] fuse_dev_read+0x1a9/0x250 [ 705.286764] ? fuse_dev_splice_read+0x840/0x840 [ 705.291433] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 705.296956] ? iov_iter_init+0xc2/0x1e0 [ 705.300917] __vfs_read+0x6ac/0x9b0 [ 705.304530] ? vfs_copy_file_range+0xb90/0xb90 [ 705.309097] ? fsnotify+0x1330/0x1330 [ 705.312883] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 705.317634] ? rw_verify_area+0x118/0x360 [ 705.321766] vfs_read+0x17f/0x3c0 [ 705.325205] ksys_read+0x101/0x260 [ 705.328728] ? kernel_write+0x120/0x120 [ 705.332688] __x64_sys_read+0x73/0xb0 [ 705.336473] ? do_syscall_64+0xca/0x820 [ 705.340429] do_syscall_64+0x1b9/0x820 [ 705.344300] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 705.349648] ? syscall_return_slowpath+0x5e0/0x5e0 [ 705.354561] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 705.359389] ? trace_hardirqs_on_caller+0x310/0x310 [ 705.364389] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 705.369389] ? prepare_exit_to_usermode+0x291/0x3b0 [ 705.374389] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 705.379217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.384407] RIP: 0033:0x4572d9 [ 705.387588] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 705.406468] RSP: 002b:00007faaeefe4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 705.414157] RAX: ffffffffffffffda RBX: 00007faaeefe56d4 RCX: 00000000004572d9 [ 705.421407] RDX: 0000000000001000 RSI: 00000000200040c0 RDI: 0000000000000003 [ 705.428659] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 705.435908] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 705.443157] R13: 00000000004d4508 R14: 00000000004c8d44 R15: 0000000000000000 [ 705.451404] Kernel Offset: disabled [ 705.455024] Rebooting in 86400 seconds..