03080)={{{@in6, @in=@remote}}, {{@in=@multicast2}}}, &(0x7f0000003180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000031c0)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000003240), &(0x7f0000003280), &(0x7f00000032c0)) stat(&(0x7f0000003300)='./file0\x00', &(0x7f0000003340)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004540)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000f80)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000046c0)) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000004740)='./file0\x00', &(0x7f0000004780)) getgroups(0x0, &(0x7f0000004800)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000049c0), &(0x7f0000004a00)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004bc0), 0x0, 0x0) 03:33:37 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000480)={0x40000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 03:33:38 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:38 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000480)={0x40000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 03:33:38 executing program 3: clock_getres(0x2, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f0000000300), &(0x7f0000000400)}}, &(0x7f0000000180)) semget(0xffffffffffffffff, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000600), &(0x7f0000000640), 0x8) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000780)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000500)=""/63) timer_delete(0x0) syz_open_dev$mouse(&(0x7f0000000680)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000006c0)={{}, 'port0\x00'}) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0xc) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x8) syz_execute_func(&(0x7f0000000080)="428055a0876969ef69dc00d9f0008f00008020c4a3750647099e1837370f38211ac4c19086d9f28fc9410feefac461b1e121e5e54175450f2e1ac4010d6453ac5d31a3b7f0802403088e9fa3a74b") 03:33:38 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:38 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000480)={0x40000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 03:33:38 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000058c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) syz_open_dev$sndtimer(&(0x7f0000007b80)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203737c3397c2ac4611311dd8f4978c73264a7400f01ef417545d8ec2e1a6901460f01ee30215da57e35988613980f1a09") openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000001880)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000018c0), &(0x7f0000001900)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001b40)) getresgid(&(0x7f0000001b80), &(0x7f0000001bc0), &(0x7f0000001c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c40), &(0x7f0000001c80)=0xc) stat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getresgid(&(0x7f0000000280), &(0x7f0000000240), &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f80)) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getgroups(0x0, &(0x7f0000002080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000020c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002100)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002200)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002240)) fstat(0xffffffffffffffff, &(0x7f0000002280)) getgid() fstat(0xffffffffffffffff, &(0x7f00000025c0)) getresgid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000002700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getpgrp(0xffffffffffffffff) getresuid(&(0x7f00000040c0), &(0x7f0000004100), &(0x7f0000004140)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in=@multicast1, @in6=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000004540)=0xe8) getresgid(&(0x7f0000004580), &(0x7f00000045c0), &(0x7f0000004600)) getpid() getresuid(&(0x7f0000005780), &(0x7f00000057c0), &(0x7f0000005800)) fstat(0xffffffffffffffff, &(0x7f0000005840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007c00)) getuid() stat(&(0x7f0000005900)='./file0\x00', &(0x7f0000005940)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000059c0)) 03:33:38 executing program 5: ppoll(&(0x7f0000000080), 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0, 0x0) 03:33:38 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000480)={0x40000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 03:33:38 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:38 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:38 executing program 4: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000fc0)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000010c0)=0xe8) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) fstat(0xffffffffffffffff, &(0x7f0000001280)) getresuid(&(0x7f0000001740), &(0x7f0000001780), &(0x7f00000017c0)) stat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000018c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001900), &(0x7f0000001940)=0xc) getgroups(0x0, &(0x7f0000001980)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000019c0)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001ac0)=0xe8) getresgid(&(0x7f0000001b00), &(0x7f0000001b40), &(0x7f0000001b80)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001c80)={{{@in=@remote, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000001d80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003080)={{{@in6, @in=@remote}}, {{@in=@multicast2}}}, &(0x7f0000003180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000031c0)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000003240), &(0x7f0000003280), &(0x7f00000032c0)) stat(&(0x7f0000003300)='./file0\x00', &(0x7f0000003340)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004540)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000f80)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000046c0)) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000004740)='./file0\x00', &(0x7f0000004780)) getgroups(0x0, &(0x7f0000004800)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000049c0), &(0x7f0000004a00)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004bc0), 0x0, 0x0) 03:33:38 executing program 5: ppoll(&(0x7f0000000080), 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0, 0x0) 03:33:38 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:38 executing program 5: ppoll(&(0x7f0000000080), 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0, 0x0) 03:33:39 executing program 3: clock_getres(0x2, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f0000000300), &(0x7f0000000400)}}, &(0x7f0000000180)) semget(0xffffffffffffffff, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000600), &(0x7f0000000640), 0x8) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000780)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000500)=""/63) timer_delete(0x0) syz_open_dev$mouse(&(0x7f0000000680)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000006c0)={{}, 'port0\x00'}) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0xc) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x8) syz_execute_func(&(0x7f0000000080)="428055a0876969ef69dc00d9f0008f00008020c4a3750647099e1837370f38211ac4c19086d9f28fc9410feefac461b1e121e5e54175450f2e1ac4010d6453ac5d31a3b7f0802403088e9fa3a74b") 03:33:39 executing program 5: ppoll(&(0x7f0000000080), 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0, 0x0) 03:33:39 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000140), &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000280)={&(0x7f0000a3dffa)={'tgr128-generic\x00'}}) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180), 0x4) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0x4) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:39 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000058c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) syz_open_dev$sndtimer(&(0x7f0000007b80)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203737c3397c2ac4611311dd8f4978c73264a7400f01ef417545d8ec2e1a6901460f01ee30215da57e35988613980f1a09") openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000001880)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000018c0), &(0x7f0000001900)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001b40)) getresgid(&(0x7f0000001b80), &(0x7f0000001bc0), &(0x7f0000001c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c40), &(0x7f0000001c80)=0xc) stat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getresgid(&(0x7f0000000280), &(0x7f0000000240), &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f80)) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getgroups(0x0, &(0x7f0000002080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000020c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002100)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002200)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002240)) fstat(0xffffffffffffffff, &(0x7f0000002280)) getgid() fstat(0xffffffffffffffff, &(0x7f00000025c0)) getresgid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000002700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getpgrp(0xffffffffffffffff) getresuid(&(0x7f00000040c0), &(0x7f0000004100), &(0x7f0000004140)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in=@multicast1, @in6=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000004540)=0xe8) getresgid(&(0x7f0000004580), &(0x7f00000045c0), &(0x7f0000004600)) getpid() getresuid(&(0x7f0000005780), &(0x7f00000057c0), &(0x7f0000005800)) fstat(0xffffffffffffffff, &(0x7f0000005840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007c00)) getuid() stat(&(0x7f0000005900)='./file0\x00', &(0x7f0000005940)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000059c0)) 03:33:39 executing program 5: clock_gettime(0xb, &(0x7f0000000040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:39 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:39 executing program 4: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000fc0)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000010c0)=0xe8) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) fstat(0xffffffffffffffff, &(0x7f0000001280)) getresuid(&(0x7f0000001740), &(0x7f0000001780), &(0x7f00000017c0)) stat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000018c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001900), &(0x7f0000001940)=0xc) getgroups(0x0, &(0x7f0000001980)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000019c0)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001ac0)=0xe8) getresgid(&(0x7f0000001b00), &(0x7f0000001b40), &(0x7f0000001b80)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001c80)={{{@in=@remote, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000001d80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003080)={{{@in6, @in=@remote}}, {{@in=@multicast2}}}, &(0x7f0000003180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000031c0)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000003240), &(0x7f0000003280), &(0x7f00000032c0)) stat(&(0x7f0000003300)='./file0\x00', &(0x7f0000003340)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004540)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000f80)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000046c0)) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000004740)='./file0\x00', &(0x7f0000004780)) getgroups(0x0, &(0x7f0000004800)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000049c0), &(0x7f0000004a00)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004bc0), 0x0, 0x0) 03:33:40 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000140), &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000280)={&(0x7f0000a3dffa)={'tgr128-generic\x00'}}) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180), 0x4) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0x4) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:40 executing program 3: clock_getres(0x2, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f0000000300), &(0x7f0000000400)}}, &(0x7f0000000180)) semget(0xffffffffffffffff, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000600), &(0x7f0000000640), 0x8) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000780)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000500)=""/63) timer_delete(0x0) syz_open_dev$mouse(&(0x7f0000000680)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000006c0)={{}, 'port0\x00'}) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0xc) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x8) syz_execute_func(&(0x7f0000000080)="428055a0876969ef69dc00d9f0008f00008020c4a3750647099e1837370f38211ac4c19086d9f28fc9410feefac461b1e121e5e54175450f2e1ac4010d6453ac5d31a3b7f0802403088e9fa3a74b") 03:33:40 executing program 5: clock_gettime(0xb, &(0x7f0000000040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:40 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000058c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) syz_open_dev$sndtimer(&(0x7f0000007b80)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203737c3397c2ac4611311dd8f4978c73264a7400f01ef417545d8ec2e1a6901460f01ee30215da57e35988613980f1a09") openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000001880)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000018c0), &(0x7f0000001900)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001b40)) getresgid(&(0x7f0000001b80), &(0x7f0000001bc0), &(0x7f0000001c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c40), &(0x7f0000001c80)=0xc) stat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getresgid(&(0x7f0000000280), &(0x7f0000000240), &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f80)) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getgroups(0x0, &(0x7f0000002080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000020c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002100)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002200)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002240)) fstat(0xffffffffffffffff, &(0x7f0000002280)) getgid() fstat(0xffffffffffffffff, &(0x7f00000025c0)) getresgid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000002700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getpgrp(0xffffffffffffffff) getresuid(&(0x7f00000040c0), &(0x7f0000004100), &(0x7f0000004140)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in=@multicast1, @in6=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000004540)=0xe8) getresgid(&(0x7f0000004580), &(0x7f00000045c0), &(0x7f0000004600)) getpid() getresuid(&(0x7f0000005780), &(0x7f00000057c0), &(0x7f0000005800)) fstat(0xffffffffffffffff, &(0x7f0000005840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007c00)) getuid() stat(&(0x7f0000005900)='./file0\x00', &(0x7f0000005940)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000059c0)) 03:33:40 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:40 executing program 4: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000fc0)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000010c0)=0xe8) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) fstat(0xffffffffffffffff, &(0x7f0000001280)) getresuid(&(0x7f0000001740), &(0x7f0000001780), &(0x7f00000017c0)) stat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000018c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001900), &(0x7f0000001940)=0xc) getgroups(0x0, &(0x7f0000001980)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000019c0)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001ac0)=0xe8) getresgid(&(0x7f0000001b00), &(0x7f0000001b40), &(0x7f0000001b80)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001c80)={{{@in=@remote, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000001d80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003080)={{{@in6, @in=@remote}}, {{@in=@multicast2}}}, &(0x7f0000003180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000031c0)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000003240), &(0x7f0000003280), &(0x7f00000032c0)) stat(&(0x7f0000003300)='./file0\x00', &(0x7f0000003340)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004540)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004580)={{{@in=@rand_addr, @in=@loopback}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000f80)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000046c0)) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000004740)='./file0\x00', &(0x7f0000004780)) getgroups(0x0, &(0x7f0000004800)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000049c0), &(0x7f0000004a00)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004bc0), 0x0, 0x0) 03:33:40 executing program 3: timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) clone(0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 03:33:40 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000140), &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000280)={&(0x7f0000a3dffa)={'tgr128-generic\x00'}}) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180), 0x4) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0x4) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:41 executing program 5: clock_gettime(0xb, &(0x7f0000000040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:41 executing program 0: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() setpriority(0x0, r1, 0x10201) mq_timedreceive(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}) 03:33:41 executing program 0: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() setpriority(0x0, r1, 0x10201) mq_timedreceive(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}) 03:33:41 executing program 0: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() setpriority(0x0, r1, 0x10201) mq_timedreceive(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}) 03:33:41 executing program 0: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() setpriority(0x0, r1, 0x10201) mq_timedreceive(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}) 03:33:41 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x200000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') accept(0xffffffffffffffff, &(0x7f00000004c0)=@xdp, &(0x7f0000000540)=0x80) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@xdp, &(0x7f0000000600)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)={@empty, @multicast2}, &(0x7f0000000680)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6, @in=@multicast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@multicast2, @in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000900)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'vcan0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000ac0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000b00)={'lo\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b80)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001440)={@multicast1, @local}, &(0x7f0000001480)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001500)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001a00)={@loopback}, &(0x7f0000001a40)=0x14) 03:33:41 executing program 4: get_mempolicy(&(0x7f0000000040), &(0x7f0000000200), 0x271e, &(0x7f0000ffc000/0x2000)=nil, 0x2) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0af0fef69dce9d92a5c4125ff0f0f37f90f38211ac4c482fd2520410feefa4e2179fbb6c8e5f5e5f5455de0932ebc2ebc0d64ac1a4c5d9f7f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000300)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 03:33:41 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:41 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000140), &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000280)={&(0x7f0000a3dffa)={'tgr128-generic\x00'}}) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180), 0x4) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0x4) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:41 executing program 3: timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) clone(0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 03:33:42 executing program 5: clock_gettime(0xb, &(0x7f0000000040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:42 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x20}, 0x60) bind$nfc_llcp(r0, &(0x7f0000000340)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8aeca5af900211715047e4402f3010fe8d14fbedb407e42a8c7e2d34e00c5c45a6569179c8f507314692e7b06dcbe9e8ac637672b5ee91cd28e2d9f3b3c52a"}, 0x60) 03:33:42 executing program 4: get_mempolicy(&(0x7f0000000040), &(0x7f0000000200), 0x271e, &(0x7f0000ffc000/0x2000)=nil, 0x2) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0af0fef69dce9d92a5c4125ff0f0f37f90f38211ac4c482fd2520410feefa4e2179fbb6c8e5f5e5f5455de0932ebc2ebc0d64ac1a4c5d9f7f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000300)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 03:33:42 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x200000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') accept(0xffffffffffffffff, &(0x7f00000004c0)=@xdp, &(0x7f0000000540)=0x80) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@xdp, &(0x7f0000000600)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)={@empty, @multicast2}, &(0x7f0000000680)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6, @in=@multicast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@multicast2, @in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000900)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'vcan0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000ac0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000b00)={'lo\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b80)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001440)={@multicast1, @local}, &(0x7f0000001480)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001500)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001a00)={@loopback}, &(0x7f0000001a40)=0x14) 03:33:42 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x20}, 0x60) bind$nfc_llcp(r0, &(0x7f0000000340)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8aeca5af900211715047e4402f3010fe8d14fbedb407e42a8c7e2d34e00c5c45a6569179c8f507314692e7b06dcbe9e8ac637672b5ee91cd28e2d9f3b3c52a"}, 0x60) 03:33:42 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x20}, 0x60) bind$nfc_llcp(r0, &(0x7f0000000340)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8aeca5af900211715047e4402f3010fe8d14fbedb407e42a8c7e2d34e00c5c45a6569179c8f507314692e7b06dcbe9e8ac637672b5ee91cd28e2d9f3b3c52a"}, 0x60) 03:33:42 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x20}, 0x60) bind$nfc_llcp(r0, &(0x7f0000000340)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8aeca5af900211715047e4402f3010fe8d14fbedb407e42a8c7e2d34e00c5c45a6569179c8f507314692e7b06dcbe9e8ac637672b5ee91cd28e2d9f3b3c52a"}, 0x60) 03:33:42 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x20}, 0x60) bind$nfc_llcp(r0, &(0x7f0000000340)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8aeca5af900211715047e4402f3010fe8d14fbedb407e42a8c7e2d34e00c5c45a6569179c8f507314692e7b06dcbe9e8ac637672b5ee91cd28e2d9f3b3c52a"}, 0x60) 03:33:42 executing program 3: timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) clone(0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 03:33:42 executing program 1: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4000, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r9, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) recvmmsg(r4, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000940)=""/172, 0xac}, {&(0x7f0000000a00)=""/155, 0x9b}, {&(0x7f0000000ac0)=""/191, 0xbf}, {&(0x7f0000000b80)=""/95, 0x5f}, {&(0x7f0000000c00)=""/3, 0x3}, {&(0x7f0000000c40)=""/115, 0x73}, {&(0x7f0000000cc0)=""/76, 0x4c}, {&(0x7f0000000d40)=""/153, 0x99}], 0x8, 0x0, 0x0, 0x8}, 0xffffffffffffffc1}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e80)=""/88, 0x58}, {&(0x7f0000000f00)=""/120, 0x78}], 0x2, &(0x7f0000000fc0)=""/87, 0x57, 0x7}, 0x10001}, {{&(0x7f0000001040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002100)=""/4096, 0x1000, 0x9}, 0x10001}, {{&(0x7f0000003100)=@nl, 0x80, &(0x7f0000003240)=[{&(0x7f0000003180)=""/148, 0x94}], 0x1, 0x0, 0x3d4, 0x8000}, 0xda6e}, {{&(0x7f0000003280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003300)=""/173, 0xad}, {&(0x7f00000033c0)=""/76, 0x4c}, {&(0x7f0000003440)=""/70, 0x46}, {&(0x7f00000034c0)=""/81, 0x51}, {&(0x7f0000003540)=""/22, 0x328}, {&(0x7f0000003580)}, {&(0x7f00000035c0)=""/88, 0x58}, {&(0x7f0000004400)=""/234, 0xea}, {&(0x7f0000003740)=""/15, 0xf}], 0x9, 0x0, 0x0, 0x3}, 0xfc3}, {{&(0x7f0000003840)=@nl, 0x80, &(0x7f0000003980)=[{&(0x7f00000038c0)=""/150, 0x96}], 0x1, &(0x7f00000039c0)=""/134, 0x86, 0x2}, 0x7}, {{&(0x7f0000003a80)=@rc, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003b00)=""/64, 0x40}, {&(0x7f0000003b40)=""/47, 0x2f}, {&(0x7f0000003b80)=""/100, 0x64}], 0x3, &(0x7f0000003c40)=""/168, 0xa8, 0xfffffffffffffffd}, 0x100000000}, {{&(0x7f0000003d00)=@l2, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003d80)=""/185, 0xb9}, {&(0x7f0000003e40)=""/97, 0x61}, {&(0x7f0000003ec0)=""/52, 0x34}], 0x3, &(0x7f0000003f40)=""/220, 0xdc, 0x401}, 0x2}], 0x8, 0x40, &(0x7f0000004240)={0x77359400}) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f0000004280)={@loopback, @mcast1, @empty, 0x4, 0x8, 0x9, 0x400, 0x555, 0x110010, r10}) r11 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200002) ioctl$SNDRV_TIMER_IOCTL_GINFO(r11, 0xc0f85403, &(0x7f00000001c0)={{0x4, 0x3, 0x3, 0x0, 0x4}, 0xfffffffffffffffd, 0x3ff, 'id0\x00', 'timer1\x00', 0x0, 0x1638, 0x3, 0x9, 0x7fffffff}) 03:33:42 executing program 5: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000240), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) geteuid() syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:43 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x20}, 0x60) bind$nfc_llcp(r0, &(0x7f0000000340)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8aeca5af900211715047e4402f3010fe8d14fbedb407e42a8c7e2d34e00c5c45a6569179c8f507314692e7b06dcbe9e8ac637672b5ee91cd28e2d9f3b3c52a"}, 0x60) [ 1146.227846] hugetlbfs: syz-executor1 (10167): Using mlock ulimits for SHM_HUGETLB is deprecated 03:33:43 executing program 1: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4000, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r9, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) recvmmsg(r4, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000940)=""/172, 0xac}, {&(0x7f0000000a00)=""/155, 0x9b}, {&(0x7f0000000ac0)=""/191, 0xbf}, {&(0x7f0000000b80)=""/95, 0x5f}, {&(0x7f0000000c00)=""/3, 0x3}, {&(0x7f0000000c40)=""/115, 0x73}, {&(0x7f0000000cc0)=""/76, 0x4c}, {&(0x7f0000000d40)=""/153, 0x99}], 0x8, 0x0, 0x0, 0x8}, 0xffffffffffffffc1}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e80)=""/88, 0x58}, {&(0x7f0000000f00)=""/120, 0x78}], 0x2, &(0x7f0000000fc0)=""/87, 0x57, 0x7}, 0x10001}, {{&(0x7f0000001040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002100)=""/4096, 0x1000, 0x9}, 0x10001}, {{&(0x7f0000003100)=@nl, 0x80, &(0x7f0000003240)=[{&(0x7f0000003180)=""/148, 0x94}], 0x1, 0x0, 0x3d4, 0x8000}, 0xda6e}, {{&(0x7f0000003280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003300)=""/173, 0xad}, {&(0x7f00000033c0)=""/76, 0x4c}, {&(0x7f0000003440)=""/70, 0x46}, {&(0x7f00000034c0)=""/81, 0x51}, {&(0x7f0000003540)=""/22, 0x328}, {&(0x7f0000003580)}, {&(0x7f00000035c0)=""/88, 0x58}, {&(0x7f0000004400)=""/234, 0xea}, {&(0x7f0000003740)=""/15, 0xf}], 0x9, 0x0, 0x0, 0x3}, 0xfc3}, {{&(0x7f0000003840)=@nl, 0x80, &(0x7f0000003980)=[{&(0x7f00000038c0)=""/150, 0x96}], 0x1, &(0x7f00000039c0)=""/134, 0x86, 0x2}, 0x7}, {{&(0x7f0000003a80)=@rc, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003b00)=""/64, 0x40}, {&(0x7f0000003b40)=""/47, 0x2f}, {&(0x7f0000003b80)=""/100, 0x64}], 0x3, &(0x7f0000003c40)=""/168, 0xa8, 0xfffffffffffffffd}, 0x100000000}, {{&(0x7f0000003d00)=@l2, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003d80)=""/185, 0xb9}, {&(0x7f0000003e40)=""/97, 0x61}, {&(0x7f0000003ec0)=""/52, 0x34}], 0x3, &(0x7f0000003f40)=""/220, 0xdc, 0x401}, 0x2}], 0x8, 0x40, &(0x7f0000004240)={0x77359400}) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f0000004280)={@loopback, @mcast1, @empty, 0x4, 0x8, 0x9, 0x400, 0x555, 0x110010, r10}) r11 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200002) ioctl$SNDRV_TIMER_IOCTL_GINFO(r11, 0xc0f85403, &(0x7f00000001c0)={{0x4, 0x3, 0x3, 0x0, 0x4}, 0xfffffffffffffffd, 0x3ff, 'id0\x00', 'timer1\x00', 0x0, 0x1638, 0x3, 0x9, 0x7fffffff}) 03:33:43 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x20}, 0x60) bind$nfc_llcp(r0, &(0x7f0000000340)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8aeca5af900211715047e4402f3010fe8d14fbedb407e42a8c7e2d34e00c5c45a6569179c8f507314692e7b06dcbe9e8ac637672b5ee91cd28e2d9f3b3c52a"}, 0x60) 03:33:43 executing program 4: get_mempolicy(&(0x7f0000000040), &(0x7f0000000200), 0x271e, &(0x7f0000ffc000/0x2000)=nil, 0x2) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0af0fef69dce9d92a5c4125ff0f0f37f90f38211ac4c482fd2520410feefa4e2179fbb6c8e5f5e5f5455de0932ebc2ebc0d64ac1a4c5d9f7f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000300)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 03:33:43 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x200000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') accept(0xffffffffffffffff, &(0x7f00000004c0)=@xdp, &(0x7f0000000540)=0x80) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@xdp, &(0x7f0000000600)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)={@empty, @multicast2}, &(0x7f0000000680)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6, @in=@multicast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@multicast2, @in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000900)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'vcan0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000ac0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000b00)={'lo\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b80)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001440)={@multicast1, @local}, &(0x7f0000001480)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001500)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001a00)={@loopback}, &(0x7f0000001a40)=0x14) 03:33:43 executing program 2: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4000, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r9, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) recvmmsg(r4, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000940)=""/172, 0xac}, {&(0x7f0000000a00)=""/155, 0x9b}, {&(0x7f0000000ac0)=""/191, 0xbf}, {&(0x7f0000000b80)=""/95, 0x5f}, {&(0x7f0000000c00)=""/3, 0x3}, {&(0x7f0000000c40)=""/115, 0x73}, {&(0x7f0000000cc0)=""/76, 0x4c}, {&(0x7f0000000d40)=""/153, 0x99}], 0x8, 0x0, 0x0, 0x8}, 0xffffffffffffffc1}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e80)=""/88, 0x58}, {&(0x7f0000000f00)=""/120, 0x78}], 0x2, &(0x7f0000000fc0)=""/87, 0x57, 0x7}, 0x10001}, {{&(0x7f0000001040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002100)=""/4096, 0x1000, 0x9}, 0x10001}, {{&(0x7f0000003100)=@nl, 0x80, &(0x7f0000003240)=[{&(0x7f0000003180)=""/148, 0x94}], 0x1, 0x0, 0x3d4, 0x8000}, 0xda6e}, {{&(0x7f0000003280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003300)=""/173, 0xad}, {&(0x7f00000033c0)=""/76, 0x4c}, {&(0x7f0000003440)=""/70, 0x46}, {&(0x7f00000034c0)=""/81, 0x51}, {&(0x7f0000003540)=""/22, 0x328}, {&(0x7f0000003580)}, {&(0x7f00000035c0)=""/88, 0x58}, {&(0x7f0000004400)=""/234, 0xea}, {&(0x7f0000003740)=""/15, 0xf}], 0x9, 0x0, 0x0, 0x3}, 0xfc3}, {{&(0x7f0000003840)=@nl, 0x80, &(0x7f0000003980)=[{&(0x7f00000038c0)=""/150, 0x96}], 0x1, &(0x7f00000039c0)=""/134, 0x86, 0x2}, 0x7}, {{&(0x7f0000003a80)=@rc, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003b00)=""/64, 0x40}, {&(0x7f0000003b40)=""/47, 0x2f}, {&(0x7f0000003b80)=""/100, 0x64}], 0x3, &(0x7f0000003c40)=""/168, 0xa8, 0xfffffffffffffffd}, 0x100000000}, {{&(0x7f0000003d00)=@l2, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003d80)=""/185, 0xb9}, {&(0x7f0000003e40)=""/97, 0x61}, {&(0x7f0000003ec0)=""/52, 0x34}], 0x3, &(0x7f0000003f40)=""/220, 0xdc, 0x401}, 0x2}], 0x8, 0x40, &(0x7f0000004240)={0x77359400}) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f0000004280)={@loopback, @mcast1, @empty, 0x4, 0x8, 0x9, 0x400, 0x555, 0x110010, r10}) r11 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200002) ioctl$SNDRV_TIMER_IOCTL_GINFO(r11, 0xc0f85403, &(0x7f00000001c0)={{0x4, 0x3, 0x3, 0x0, 0x4}, 0xfffffffffffffffd, 0x3ff, 'id0\x00', 'timer1\x00', 0x0, 0x1638, 0x3, 0x9, 0x7fffffff}) 03:33:43 executing program 1: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4000, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r9, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) recvmmsg(r4, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000940)=""/172, 0xac}, {&(0x7f0000000a00)=""/155, 0x9b}, {&(0x7f0000000ac0)=""/191, 0xbf}, {&(0x7f0000000b80)=""/95, 0x5f}, {&(0x7f0000000c00)=""/3, 0x3}, {&(0x7f0000000c40)=""/115, 0x73}, {&(0x7f0000000cc0)=""/76, 0x4c}, {&(0x7f0000000d40)=""/153, 0x99}], 0x8, 0x0, 0x0, 0x8}, 0xffffffffffffffc1}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e80)=""/88, 0x58}, {&(0x7f0000000f00)=""/120, 0x78}], 0x2, &(0x7f0000000fc0)=""/87, 0x57, 0x7}, 0x10001}, {{&(0x7f0000001040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002100)=""/4096, 0x1000, 0x9}, 0x10001}, {{&(0x7f0000003100)=@nl, 0x80, &(0x7f0000003240)=[{&(0x7f0000003180)=""/148, 0x94}], 0x1, 0x0, 0x3d4, 0x8000}, 0xda6e}, {{&(0x7f0000003280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003300)=""/173, 0xad}, {&(0x7f00000033c0)=""/76, 0x4c}, {&(0x7f0000003440)=""/70, 0x46}, {&(0x7f00000034c0)=""/81, 0x51}, {&(0x7f0000003540)=""/22, 0x328}, {&(0x7f0000003580)}, {&(0x7f00000035c0)=""/88, 0x58}, {&(0x7f0000004400)=""/234, 0xea}, {&(0x7f0000003740)=""/15, 0xf}], 0x9, 0x0, 0x0, 0x3}, 0xfc3}, {{&(0x7f0000003840)=@nl, 0x80, &(0x7f0000003980)=[{&(0x7f00000038c0)=""/150, 0x96}], 0x1, &(0x7f00000039c0)=""/134, 0x86, 0x2}, 0x7}, {{&(0x7f0000003a80)=@rc, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003b00)=""/64, 0x40}, {&(0x7f0000003b40)=""/47, 0x2f}, {&(0x7f0000003b80)=""/100, 0x64}], 0x3, &(0x7f0000003c40)=""/168, 0xa8, 0xfffffffffffffffd}, 0x100000000}, {{&(0x7f0000003d00)=@l2, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003d80)=""/185, 0xb9}, {&(0x7f0000003e40)=""/97, 0x61}, {&(0x7f0000003ec0)=""/52, 0x34}], 0x3, &(0x7f0000003f40)=""/220, 0xdc, 0x401}, 0x2}], 0x8, 0x40, &(0x7f0000004240)={0x77359400}) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f0000004280)={@loopback, @mcast1, @empty, 0x4, 0x8, 0x9, 0x400, 0x555, 0x110010, r10}) r11 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200002) ioctl$SNDRV_TIMER_IOCTL_GINFO(r11, 0xc0f85403, &(0x7f00000001c0)={{0x4, 0x3, 0x3, 0x0, 0x4}, 0xfffffffffffffffd, 0x3ff, 'id0\x00', 'timer1\x00', 0x0, 0x1638, 0x3, 0x9, 0x7fffffff}) 03:33:43 executing program 1: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4000, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r9, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) recvmmsg(r4, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000940)=""/172, 0xac}, {&(0x7f0000000a00)=""/155, 0x9b}, {&(0x7f0000000ac0)=""/191, 0xbf}, {&(0x7f0000000b80)=""/95, 0x5f}, {&(0x7f0000000c00)=""/3, 0x3}, {&(0x7f0000000c40)=""/115, 0x73}, {&(0x7f0000000cc0)=""/76, 0x4c}, {&(0x7f0000000d40)=""/153, 0x99}], 0x8, 0x0, 0x0, 0x8}, 0xffffffffffffffc1}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e80)=""/88, 0x58}, {&(0x7f0000000f00)=""/120, 0x78}], 0x2, &(0x7f0000000fc0)=""/87, 0x57, 0x7}, 0x10001}, {{&(0x7f0000001040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002100)=""/4096, 0x1000, 0x9}, 0x10001}, {{&(0x7f0000003100)=@nl, 0x80, &(0x7f0000003240)=[{&(0x7f0000003180)=""/148, 0x94}], 0x1, 0x0, 0x3d4, 0x8000}, 0xda6e}, {{&(0x7f0000003280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003300)=""/173, 0xad}, {&(0x7f00000033c0)=""/76, 0x4c}, {&(0x7f0000003440)=""/70, 0x46}, {&(0x7f00000034c0)=""/81, 0x51}, {&(0x7f0000003540)=""/22, 0x328}, {&(0x7f0000003580)}, {&(0x7f00000035c0)=""/88, 0x58}, {&(0x7f0000004400)=""/234, 0xea}, {&(0x7f0000003740)=""/15, 0xf}], 0x9, 0x0, 0x0, 0x3}, 0xfc3}, {{&(0x7f0000003840)=@nl, 0x80, &(0x7f0000003980)=[{&(0x7f00000038c0)=""/150, 0x96}], 0x1, &(0x7f00000039c0)=""/134, 0x86, 0x2}, 0x7}, {{&(0x7f0000003a80)=@rc, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003b00)=""/64, 0x40}, {&(0x7f0000003b40)=""/47, 0x2f}, {&(0x7f0000003b80)=""/100, 0x64}], 0x3, &(0x7f0000003c40)=""/168, 0xa8, 0xfffffffffffffffd}, 0x100000000}, {{&(0x7f0000003d00)=@l2, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003d80)=""/185, 0xb9}, {&(0x7f0000003e40)=""/97, 0x61}, {&(0x7f0000003ec0)=""/52, 0x34}], 0x3, &(0x7f0000003f40)=""/220, 0xdc, 0x401}, 0x2}], 0x8, 0x40, &(0x7f0000004240)={0x77359400}) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f0000004280)={@loopback, @mcast1, @empty, 0x4, 0x8, 0x9, 0x400, 0x555, 0x110010, r10}) r11 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200002) ioctl$SNDRV_TIMER_IOCTL_GINFO(r11, 0xc0f85403, &(0x7f00000001c0)={{0x4, 0x3, 0x3, 0x0, 0x4}, 0xfffffffffffffffd, 0x3ff, 'id0\x00', 'timer1\x00', 0x0, 0x1638, 0x3, 0x9, 0x7fffffff}) 03:33:43 executing program 2: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4000, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r9, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) recvmmsg(r4, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000940)=""/172, 0xac}, {&(0x7f0000000a00)=""/155, 0x9b}, {&(0x7f0000000ac0)=""/191, 0xbf}, {&(0x7f0000000b80)=""/95, 0x5f}, {&(0x7f0000000c00)=""/3, 0x3}, {&(0x7f0000000c40)=""/115, 0x73}, {&(0x7f0000000cc0)=""/76, 0x4c}, {&(0x7f0000000d40)=""/153, 0x99}], 0x8, 0x0, 0x0, 0x8}, 0xffffffffffffffc1}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e80)=""/88, 0x58}, {&(0x7f0000000f00)=""/120, 0x78}], 0x2, &(0x7f0000000fc0)=""/87, 0x57, 0x7}, 0x10001}, {{&(0x7f0000001040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002100)=""/4096, 0x1000, 0x9}, 0x10001}, {{&(0x7f0000003100)=@nl, 0x80, &(0x7f0000003240)=[{&(0x7f0000003180)=""/148, 0x94}], 0x1, 0x0, 0x3d4, 0x8000}, 0xda6e}, {{&(0x7f0000003280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003300)=""/173, 0xad}, {&(0x7f00000033c0)=""/76, 0x4c}, {&(0x7f0000003440)=""/70, 0x46}, {&(0x7f00000034c0)=""/81, 0x51}, {&(0x7f0000003540)=""/22, 0x328}, {&(0x7f0000003580)}, {&(0x7f00000035c0)=""/88, 0x58}, {&(0x7f0000004400)=""/234, 0xea}, {&(0x7f0000003740)=""/15, 0xf}], 0x9, 0x0, 0x0, 0x3}, 0xfc3}, {{&(0x7f0000003840)=@nl, 0x80, &(0x7f0000003980)=[{&(0x7f00000038c0)=""/150, 0x96}], 0x1, &(0x7f00000039c0)=""/134, 0x86, 0x2}, 0x7}, {{&(0x7f0000003a80)=@rc, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003b00)=""/64, 0x40}, {&(0x7f0000003b40)=""/47, 0x2f}, {&(0x7f0000003b80)=""/100, 0x64}], 0x3, &(0x7f0000003c40)=""/168, 0xa8, 0xfffffffffffffffd}, 0x100000000}, {{&(0x7f0000003d00)=@l2, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003d80)=""/185, 0xb9}, {&(0x7f0000003e40)=""/97, 0x61}, {&(0x7f0000003ec0)=""/52, 0x34}], 0x3, &(0x7f0000003f40)=""/220, 0xdc, 0x401}, 0x2}], 0x8, 0x40, &(0x7f0000004240)={0x77359400}) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f0000004280)={@loopback, @mcast1, @empty, 0x4, 0x8, 0x9, 0x400, 0x555, 0x110010, r10}) r11 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200002) ioctl$SNDRV_TIMER_IOCTL_GINFO(r11, 0xc0f85403, &(0x7f00000001c0)={{0x4, 0x3, 0x3, 0x0, 0x4}, 0xfffffffffffffffd, 0x3ff, 'id0\x00', 'timer1\x00', 0x0, 0x1638, 0x3, 0x9, 0x7fffffff}) 03:33:43 executing program 3: timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) clone(0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 03:33:43 executing program 5: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000240), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) geteuid() syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:43 executing program 1: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4000, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r9, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) recvmmsg(r4, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000940)=""/172, 0xac}, {&(0x7f0000000a00)=""/155, 0x9b}, {&(0x7f0000000ac0)=""/191, 0xbf}, {&(0x7f0000000b80)=""/95, 0x5f}, {&(0x7f0000000c00)=""/3, 0x3}, {&(0x7f0000000c40)=""/115, 0x73}, {&(0x7f0000000cc0)=""/76, 0x4c}, {&(0x7f0000000d40)=""/153, 0x99}], 0x8, 0x0, 0x0, 0x8}, 0xffffffffffffffc1}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e80)=""/88, 0x58}, {&(0x7f0000000f00)=""/120, 0x78}], 0x2, &(0x7f0000000fc0)=""/87, 0x57, 0x7}, 0x10001}, {{&(0x7f0000001040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002100)=""/4096, 0x1000, 0x9}, 0x10001}, {{&(0x7f0000003100)=@nl, 0x80, &(0x7f0000003240)=[{&(0x7f0000003180)=""/148, 0x94}], 0x1, 0x0, 0x3d4, 0x8000}, 0xda6e}, {{&(0x7f0000003280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003300)=""/173, 0xad}, {&(0x7f00000033c0)=""/76, 0x4c}, {&(0x7f0000003440)=""/70, 0x46}, {&(0x7f00000034c0)=""/81, 0x51}, {&(0x7f0000003540)=""/22, 0x328}, {&(0x7f0000003580)}, {&(0x7f00000035c0)=""/88, 0x58}, {&(0x7f0000004400)=""/234, 0xea}, {&(0x7f0000003740)=""/15, 0xf}], 0x9, 0x0, 0x0, 0x3}, 0xfc3}, {{&(0x7f0000003840)=@nl, 0x80, &(0x7f0000003980)=[{&(0x7f00000038c0)=""/150, 0x96}], 0x1, &(0x7f00000039c0)=""/134, 0x86, 0x2}, 0x7}, {{&(0x7f0000003a80)=@rc, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003b00)=""/64, 0x40}, {&(0x7f0000003b40)=""/47, 0x2f}, {&(0x7f0000003b80)=""/100, 0x64}], 0x3, &(0x7f0000003c40)=""/168, 0xa8, 0xfffffffffffffffd}, 0x100000000}, {{&(0x7f0000003d00)=@l2, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003d80)=""/185, 0xb9}, {&(0x7f0000003e40)=""/97, 0x61}, {&(0x7f0000003ec0)=""/52, 0x34}], 0x3, &(0x7f0000003f40)=""/220, 0xdc, 0x401}, 0x2}], 0x8, 0x40, &(0x7f0000004240)={0x77359400}) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f0000004280)={@loopback, @mcast1, @empty, 0x4, 0x8, 0x9, 0x400, 0x555, 0x110010, r10}) r11 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200002) ioctl$SNDRV_TIMER_IOCTL_GINFO(r11, 0xc0f85403, &(0x7f00000001c0)={{0x4, 0x3, 0x3, 0x0, 0x4}, 0xfffffffffffffffd, 0x3ff, 'id0\x00', 'timer1\x00', 0x0, 0x1638, 0x3, 0x9, 0x7fffffff}) 03:33:43 executing program 2: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4000, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r9, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) recvmmsg(r4, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000940)=""/172, 0xac}, {&(0x7f0000000a00)=""/155, 0x9b}, {&(0x7f0000000ac0)=""/191, 0xbf}, {&(0x7f0000000b80)=""/95, 0x5f}, {&(0x7f0000000c00)=""/3, 0x3}, {&(0x7f0000000c40)=""/115, 0x73}, {&(0x7f0000000cc0)=""/76, 0x4c}, {&(0x7f0000000d40)=""/153, 0x99}], 0x8, 0x0, 0x0, 0x8}, 0xffffffffffffffc1}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e80)=""/88, 0x58}, {&(0x7f0000000f00)=""/120, 0x78}], 0x2, &(0x7f0000000fc0)=""/87, 0x57, 0x7}, 0x10001}, {{&(0x7f0000001040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002100)=""/4096, 0x1000, 0x9}, 0x10001}, {{&(0x7f0000003100)=@nl, 0x80, &(0x7f0000003240)=[{&(0x7f0000003180)=""/148, 0x94}], 0x1, 0x0, 0x3d4, 0x8000}, 0xda6e}, {{&(0x7f0000003280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003300)=""/173, 0xad}, {&(0x7f00000033c0)=""/76, 0x4c}, {&(0x7f0000003440)=""/70, 0x46}, {&(0x7f00000034c0)=""/81, 0x51}, {&(0x7f0000003540)=""/22, 0x328}, {&(0x7f0000003580)}, {&(0x7f00000035c0)=""/88, 0x58}, {&(0x7f0000004400)=""/234, 0xea}, {&(0x7f0000003740)=""/15, 0xf}], 0x9, 0x0, 0x0, 0x3}, 0xfc3}, {{&(0x7f0000003840)=@nl, 0x80, &(0x7f0000003980)=[{&(0x7f00000038c0)=""/150, 0x96}], 0x1, &(0x7f00000039c0)=""/134, 0x86, 0x2}, 0x7}, {{&(0x7f0000003a80)=@rc, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003b00)=""/64, 0x40}, {&(0x7f0000003b40)=""/47, 0x2f}, {&(0x7f0000003b80)=""/100, 0x64}], 0x3, &(0x7f0000003c40)=""/168, 0xa8, 0xfffffffffffffffd}, 0x100000000}, {{&(0x7f0000003d00)=@l2, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003d80)=""/185, 0xb9}, {&(0x7f0000003e40)=""/97, 0x61}, {&(0x7f0000003ec0)=""/52, 0x34}], 0x3, &(0x7f0000003f40)=""/220, 0xdc, 0x401}, 0x2}], 0x8, 0x40, &(0x7f0000004240)={0x77359400}) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f0000004280)={@loopback, @mcast1, @empty, 0x4, 0x8, 0x9, 0x400, 0x555, 0x110010, r10}) r11 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200002) ioctl$SNDRV_TIMER_IOCTL_GINFO(r11, 0xc0f85403, &(0x7f00000001c0)={{0x4, 0x3, 0x3, 0x0, 0x4}, 0xfffffffffffffffd, 0x3ff, 'id0\x00', 'timer1\x00', 0x0, 0x1638, 0x3, 0x9, 0x7fffffff}) 03:33:43 executing program 1: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4000, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r9, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) recvmmsg(r4, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000940)=""/172, 0xac}, {&(0x7f0000000a00)=""/155, 0x9b}, {&(0x7f0000000ac0)=""/191, 0xbf}, {&(0x7f0000000b80)=""/95, 0x5f}, {&(0x7f0000000c00)=""/3, 0x3}, {&(0x7f0000000c40)=""/115, 0x73}, {&(0x7f0000000cc0)=""/76, 0x4c}, {&(0x7f0000000d40)=""/153, 0x99}], 0x8, 0x0, 0x0, 0x8}, 0xffffffffffffffc1}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e80)=""/88, 0x58}, {&(0x7f0000000f00)=""/120, 0x78}], 0x2, &(0x7f0000000fc0)=""/87, 0x57, 0x7}, 0x10001}, {{&(0x7f0000001040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002100)=""/4096, 0x1000, 0x9}, 0x10001}, {{&(0x7f0000003100)=@nl, 0x80, &(0x7f0000003240)=[{&(0x7f0000003180)=""/148, 0x94}], 0x1, 0x0, 0x3d4, 0x8000}, 0xda6e}, {{&(0x7f0000003280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003300)=""/173, 0xad}, {&(0x7f00000033c0)=""/76, 0x4c}, {&(0x7f0000003440)=""/70, 0x46}, {&(0x7f00000034c0)=""/81, 0x51}, {&(0x7f0000003540)=""/22, 0x328}, {&(0x7f0000003580)}, {&(0x7f00000035c0)=""/88, 0x58}, {&(0x7f0000004400)=""/234, 0xea}, {&(0x7f0000003740)=""/15, 0xf}], 0x9, 0x0, 0x0, 0x3}, 0xfc3}, {{&(0x7f0000003840)=@nl, 0x80, &(0x7f0000003980)=[{&(0x7f00000038c0)=""/150, 0x96}], 0x1, &(0x7f00000039c0)=""/134, 0x86, 0x2}, 0x7}, {{&(0x7f0000003a80)=@rc, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003b00)=""/64, 0x40}, {&(0x7f0000003b40)=""/47, 0x2f}, {&(0x7f0000003b80)=""/100, 0x64}], 0x3, &(0x7f0000003c40)=""/168, 0xa8, 0xfffffffffffffffd}, 0x100000000}, {{&(0x7f0000003d00)=@l2, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003d80)=""/185, 0xb9}, {&(0x7f0000003e40)=""/97, 0x61}, {&(0x7f0000003ec0)=""/52, 0x34}], 0x3, &(0x7f0000003f40)=""/220, 0xdc, 0x401}, 0x2}], 0x8, 0x40, &(0x7f0000004240)={0x77359400}) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f0000004280)={@loopback, @mcast1, @empty, 0x4, 0x8, 0x9, 0x400, 0x555, 0x110010, r10}) r11 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200002) ioctl$SNDRV_TIMER_IOCTL_GINFO(r11, 0xc0f85403, &(0x7f00000001c0)={{0x4, 0x3, 0x3, 0x0, 0x4}, 0xfffffffffffffffd, 0x3ff, 'id0\x00', 'timer1\x00', 0x0, 0x1638, 0x3, 0x9, 0x7fffffff}) 03:33:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4000, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r9, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) recvmmsg(r4, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000940)=""/172, 0xac}, {&(0x7f0000000a00)=""/155, 0x9b}, {&(0x7f0000000ac0)=""/191, 0xbf}, {&(0x7f0000000b80)=""/95, 0x5f}, {&(0x7f0000000c00)=""/3, 0x3}, {&(0x7f0000000c40)=""/115, 0x73}, {&(0x7f0000000cc0)=""/76, 0x4c}, {&(0x7f0000000d40)=""/153, 0x99}], 0x8, 0x0, 0x0, 0x8}, 0xffffffffffffffc1}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e80)=""/88, 0x58}, {&(0x7f0000000f00)=""/120, 0x78}], 0x2, &(0x7f0000000fc0)=""/87, 0x57, 0x7}, 0x10001}, {{&(0x7f0000001040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002100)=""/4096, 0x1000, 0x9}, 0x10001}, {{&(0x7f0000003100)=@nl, 0x80, &(0x7f0000003240)=[{&(0x7f0000003180)=""/148, 0x94}], 0x1, 0x0, 0x3d4, 0x8000}, 0xda6e}, {{&(0x7f0000003280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003300)=""/173, 0xad}, {&(0x7f00000033c0)=""/76, 0x4c}, {&(0x7f0000003440)=""/70, 0x46}, {&(0x7f00000034c0)=""/81, 0x51}, {&(0x7f0000003540)=""/22, 0x328}, {&(0x7f0000003580)}, {&(0x7f00000035c0)=""/88, 0x58}, {&(0x7f0000004400)=""/234, 0xea}, {&(0x7f0000003740)=""/15, 0xf}], 0x9, 0x0, 0x0, 0x3}, 0xfc3}, {{&(0x7f0000003840)=@nl, 0x80, &(0x7f0000003980)=[{&(0x7f00000038c0)=""/150, 0x96}], 0x1, &(0x7f00000039c0)=""/134, 0x86, 0x2}, 0x7}, {{&(0x7f0000003a80)=@rc, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003b00)=""/64, 0x40}, {&(0x7f0000003b40)=""/47, 0x2f}, {&(0x7f0000003b80)=""/100, 0x64}], 0x3, &(0x7f0000003c40)=""/168, 0xa8, 0xfffffffffffffffd}, 0x100000000}, {{&(0x7f0000003d00)=@l2, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003d80)=""/185, 0xb9}, {&(0x7f0000003e40)=""/97, 0x61}, {&(0x7f0000003ec0)=""/52, 0x34}], 0x3, &(0x7f0000003f40)=""/220, 0xdc, 0x401}, 0x2}], 0x8, 0x40, &(0x7f0000004240)={0x77359400}) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f0000004280)={@loopback, @mcast1, @empty, 0x4, 0x8, 0x9, 0x400, 0x555, 0x110010, r10}) r11 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200002) ioctl$SNDRV_TIMER_IOCTL_GINFO(r11, 0xc0f85403, &(0x7f00000001c0)={{0x4, 0x3, 0x3, 0x0, 0x4}, 0xfffffffffffffffd, 0x3ff, 'id0\x00', 'timer1\x00', 0x0, 0x1638, 0x3, 0x9, 0x7fffffff}) 03:33:44 executing program 4: get_mempolicy(&(0x7f0000000040), &(0x7f0000000200), 0x271e, &(0x7f0000ffc000/0x2000)=nil, 0x2) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0af0fef69dce9d92a5c4125ff0f0f37f90f38211ac4c482fd2520410feefa4e2179fbb6c8e5f5e5f5455de0932ebc2ebc0d64ac1a4c5d9f7f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000300)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 03:33:44 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x200000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') accept(0xffffffffffffffff, &(0x7f00000004c0)=@xdp, &(0x7f0000000540)=0x80) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@xdp, &(0x7f0000000600)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)={@empty, @multicast2}, &(0x7f0000000680)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6, @in=@multicast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@multicast2, @in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000900)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'vcan0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000ac0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000b00)={'lo\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b80)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001440)={@multicast1, @local}, &(0x7f0000001480)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001500)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001a00)={@loopback}, &(0x7f0000001a40)=0x14) 03:33:44 executing program 1: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4000, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r9, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) recvmmsg(r4, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000940)=""/172, 0xac}, {&(0x7f0000000a00)=""/155, 0x9b}, {&(0x7f0000000ac0)=""/191, 0xbf}, {&(0x7f0000000b80)=""/95, 0x5f}, {&(0x7f0000000c00)=""/3, 0x3}, {&(0x7f0000000c40)=""/115, 0x73}, {&(0x7f0000000cc0)=""/76, 0x4c}, {&(0x7f0000000d40)=""/153, 0x99}], 0x8, 0x0, 0x0, 0x8}, 0xffffffffffffffc1}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e80)=""/88, 0x58}, {&(0x7f0000000f00)=""/120, 0x78}], 0x2, &(0x7f0000000fc0)=""/87, 0x57, 0x7}, 0x10001}, {{&(0x7f0000001040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002100)=""/4096, 0x1000, 0x9}, 0x10001}, {{&(0x7f0000003100)=@nl, 0x80, &(0x7f0000003240)=[{&(0x7f0000003180)=""/148, 0x94}], 0x1, 0x0, 0x3d4, 0x8000}, 0xda6e}, {{&(0x7f0000003280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003300)=""/173, 0xad}, {&(0x7f00000033c0)=""/76, 0x4c}, {&(0x7f0000003440)=""/70, 0x46}, {&(0x7f00000034c0)=""/81, 0x51}, {&(0x7f0000003540)=""/22, 0x328}, {&(0x7f0000003580)}, {&(0x7f00000035c0)=""/88, 0x58}, {&(0x7f0000004400)=""/234, 0xea}, {&(0x7f0000003740)=""/15, 0xf}], 0x9, 0x0, 0x0, 0x3}, 0xfc3}, {{&(0x7f0000003840)=@nl, 0x80, &(0x7f0000003980)=[{&(0x7f00000038c0)=""/150, 0x96}], 0x1, &(0x7f00000039c0)=""/134, 0x86, 0x2}, 0x7}, {{&(0x7f0000003a80)=@rc, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003b00)=""/64, 0x40}, {&(0x7f0000003b40)=""/47, 0x2f}, {&(0x7f0000003b80)=""/100, 0x64}], 0x3, &(0x7f0000003c40)=""/168, 0xa8, 0xfffffffffffffffd}, 0x100000000}, {{&(0x7f0000003d00)=@l2, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003d80)=""/185, 0xb9}, {&(0x7f0000003e40)=""/97, 0x61}, {&(0x7f0000003ec0)=""/52, 0x34}], 0x3, &(0x7f0000003f40)=""/220, 0xdc, 0x401}, 0x2}], 0x8, 0x40, &(0x7f0000004240)={0x77359400}) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f0000004280)={@loopback, @mcast1, @empty, 0x4, 0x8, 0x9, 0x400, 0x555, 0x110010, r10}) r11 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200002) ioctl$SNDRV_TIMER_IOCTL_GINFO(r11, 0xc0f85403, &(0x7f00000001c0)={{0x4, 0x3, 0x3, 0x0, 0x4}, 0xfffffffffffffffd, 0x3ff, 'id0\x00', 'timer1\x00', 0x0, 0x1638, 0x3, 0x9, 0x7fffffff}) 03:33:44 executing program 5: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000240), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) geteuid() syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4000, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r9, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) recvmmsg(r4, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000940)=""/172, 0xac}, {&(0x7f0000000a00)=""/155, 0x9b}, {&(0x7f0000000ac0)=""/191, 0xbf}, {&(0x7f0000000b80)=""/95, 0x5f}, {&(0x7f0000000c00)=""/3, 0x3}, {&(0x7f0000000c40)=""/115, 0x73}, {&(0x7f0000000cc0)=""/76, 0x4c}, {&(0x7f0000000d40)=""/153, 0x99}], 0x8, 0x0, 0x0, 0x8}, 0xffffffffffffffc1}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e80)=""/88, 0x58}, {&(0x7f0000000f00)=""/120, 0x78}], 0x2, &(0x7f0000000fc0)=""/87, 0x57, 0x7}, 0x10001}, {{&(0x7f0000001040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002100)=""/4096, 0x1000, 0x9}, 0x10001}, {{&(0x7f0000003100)=@nl, 0x80, &(0x7f0000003240)=[{&(0x7f0000003180)=""/148, 0x94}], 0x1, 0x0, 0x3d4, 0x8000}, 0xda6e}, {{&(0x7f0000003280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003300)=""/173, 0xad}, {&(0x7f00000033c0)=""/76, 0x4c}, {&(0x7f0000003440)=""/70, 0x46}, {&(0x7f00000034c0)=""/81, 0x51}, {&(0x7f0000003540)=""/22, 0x328}, {&(0x7f0000003580)}, {&(0x7f00000035c0)=""/88, 0x58}, {&(0x7f0000004400)=""/234, 0xea}, {&(0x7f0000003740)=""/15, 0xf}], 0x9, 0x0, 0x0, 0x3}, 0xfc3}, {{&(0x7f0000003840)=@nl, 0x80, &(0x7f0000003980)=[{&(0x7f00000038c0)=""/150, 0x96}], 0x1, &(0x7f00000039c0)=""/134, 0x86, 0x2}, 0x7}, {{&(0x7f0000003a80)=@rc, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003b00)=""/64, 0x40}, {&(0x7f0000003b40)=""/47, 0x2f}, {&(0x7f0000003b80)=""/100, 0x64}], 0x3, &(0x7f0000003c40)=""/168, 0xa8, 0xfffffffffffffffd}, 0x100000000}, {{&(0x7f0000003d00)=@l2, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003d80)=""/185, 0xb9}, {&(0x7f0000003e40)=""/97, 0x61}, {&(0x7f0000003ec0)=""/52, 0x34}], 0x3, &(0x7f0000003f40)=""/220, 0xdc, 0x401}, 0x2}], 0x8, 0x40, &(0x7f0000004240)={0x77359400}) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f0000004280)={@loopback, @mcast1, @empty, 0x4, 0x8, 0x9, 0x400, 0x555, 0x110010, r10}) r11 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200002) ioctl$SNDRV_TIMER_IOCTL_GINFO(r11, 0xc0f85403, &(0x7f00000001c0)={{0x4, 0x3, 0x3, 0x0, 0x4}, 0xfffffffffffffffd, 0x3ff, 'id0\x00', 'timer1\x00', 0x0, 0x1638, 0x3, 0x9, 0x7fffffff}) 03:33:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) 03:33:44 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000a00)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERROR(r1, &(0x7f0000000a40)=ANY=[@ANYBLOB="1d0000000701001400706f7369785f61634b80e8de8865737373"], 0x1a) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) 03:33:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4000, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r9, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) recvmmsg(r4, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000940)=""/172, 0xac}, {&(0x7f0000000a00)=""/155, 0x9b}, {&(0x7f0000000ac0)=""/191, 0xbf}, {&(0x7f0000000b80)=""/95, 0x5f}, {&(0x7f0000000c00)=""/3, 0x3}, {&(0x7f0000000c40)=""/115, 0x73}, {&(0x7f0000000cc0)=""/76, 0x4c}, {&(0x7f0000000d40)=""/153, 0x99}], 0x8, 0x0, 0x0, 0x8}, 0xffffffffffffffc1}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e80)=""/88, 0x58}, {&(0x7f0000000f00)=""/120, 0x78}], 0x2, &(0x7f0000000fc0)=""/87, 0x57, 0x7}, 0x10001}, {{&(0x7f0000001040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002100)=""/4096, 0x1000, 0x9}, 0x10001}, {{&(0x7f0000003100)=@nl, 0x80, &(0x7f0000003240)=[{&(0x7f0000003180)=""/148, 0x94}], 0x1, 0x0, 0x3d4, 0x8000}, 0xda6e}, {{&(0x7f0000003280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003300)=""/173, 0xad}, {&(0x7f00000033c0)=""/76, 0x4c}, {&(0x7f0000003440)=""/70, 0x46}, {&(0x7f00000034c0)=""/81, 0x51}, {&(0x7f0000003540)=""/22, 0x328}, {&(0x7f0000003580)}, {&(0x7f00000035c0)=""/88, 0x58}, {&(0x7f0000004400)=""/234, 0xea}, {&(0x7f0000003740)=""/15, 0xf}], 0x9, 0x0, 0x0, 0x3}, 0xfc3}, {{&(0x7f0000003840)=@nl, 0x80, &(0x7f0000003980)=[{&(0x7f00000038c0)=""/150, 0x96}], 0x1, &(0x7f00000039c0)=""/134, 0x86, 0x2}, 0x7}, {{&(0x7f0000003a80)=@rc, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003b00)=""/64, 0x40}, {&(0x7f0000003b40)=""/47, 0x2f}, {&(0x7f0000003b80)=""/100, 0x64}], 0x3, &(0x7f0000003c40)=""/168, 0xa8, 0xfffffffffffffffd}, 0x100000000}, {{&(0x7f0000003d00)=@l2, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003d80)=""/185, 0xb9}, {&(0x7f0000003e40)=""/97, 0x61}, {&(0x7f0000003ec0)=""/52, 0x34}], 0x3, &(0x7f0000003f40)=""/220, 0xdc, 0x401}, 0x2}], 0x8, 0x40, &(0x7f0000004240)={0x77359400}) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f0000004280)={@loopback, @mcast1, @empty, 0x4, 0x8, 0x9, 0x400, 0x555, 0x110010, r10}) r11 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200002) ioctl$SNDRV_TIMER_IOCTL_GINFO(r11, 0xc0f85403, &(0x7f00000001c0)={{0x4, 0x3, 0x3, 0x0, 0x4}, 0xfffffffffffffffd, 0x3ff, 'id0\x00', 'timer1\x00', 0x0, 0x1638, 0x3, 0x9, 0x7fffffff}) 03:33:44 executing program 3: keyctl$dh_compute(0x14, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000002f00)=""/4096, &(0x7f0000000600)=0x1321) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") [ 1148.046295] 9pnet: p9_errstr2errno: server reported unknown error posix_acK€èÞˆesss 03:33:44 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffd) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x400000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) 03:33:44 executing program 5: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000240), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) geteuid() syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:44 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000a00)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERROR(r1, &(0x7f0000000a40)=ANY=[@ANYBLOB="1d0000000701001400706f7369785f61634b80e8de8865737373"], 0x1a) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) [ 1148.386077] 9pnet: p9_errstr2errno: server reported unknown error posix_acK€èÞˆesss 03:33:45 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000a00)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERROR(r1, &(0x7f0000000a40)=ANY=[@ANYBLOB="1d0000000701001400706f7369785f61634b80e8de8865737373"], 0x1a) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) 03:33:45 executing program 4: mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0) pipe(&(0x7f0000000740)) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000980)="428055a0836969ef69dc00d9ce41ff0f1837374f021ac48f6818ccb6ffefffff0b4e2179fbade54175450f2e1a8fe95893cdc4433538e2900d64ac1e5d31a3b706656566460fe25a379f7f") 03:33:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") flistxattr(r0, &(0x7f00000000c0)=""/89, 0x0) 03:33:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") flistxattr(r0, &(0x7f00000000c0)=""/89, 0x0) [ 1148.691687] 9pnet: p9_errstr2errno: server reported unknown error posix_acK€èÞˆesss 03:33:45 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000a00)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERROR(r1, &(0x7f0000000a40)=ANY=[@ANYBLOB="1d0000000701001400706f7369785f61634b80e8de8865737373"], 0x1a) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) 03:33:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x43) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x3a, {{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}, 0x40}}}, 0x88) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) 03:33:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") flistxattr(r0, &(0x7f00000000c0)=""/89, 0x0) 03:33:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") flistxattr(r0, &(0x7f00000000c0)=""/89, 0x0) 03:33:45 executing program 3: keyctl$dh_compute(0x14, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000002f00)=""/4096, &(0x7f0000000600)=0x1321) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") [ 1148.971103] 9pnet: p9_errstr2errno: server reported unknown error posix_acK€èÞˆesss 03:33:45 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffd) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x400000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) 03:33:45 executing program 0: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000004c0)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000540)={0x2, 0x0, @dev}, &(0x7f0000000580)=0x10, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000005c0)={'bridge0\x00'}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000500)='cpuset\x00') epoll_create1(0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000480)='y\x00', 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)={@remote, @rand_addr}, 0x8) getgroups(0x0, &(0x7f0000000000)) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)) setregid(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:33:45 executing program 1: mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000780)=""/234) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000001c0)={{}, 'syz0\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000340)) syz_execute_func(&(0x7f00000003c0)="428055a0726969ef69dc00d99069203737c3397c2a068fa978dbc9c4a252f5ee4415406e9e7a9e01efe5e5417545c462010d420036f3e1003ef0f6585501ee31a3b786e2989f3643c144c900eb") openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000040)=""/58) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000680)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001080)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000019c0)) lstat(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b00)={{{@in=@loopback}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000001c00)=0xe8) lstat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@ipv4={[], [], @dev}, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000001e00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e40), &(0x7f0000001e80)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000000180)=@proc, 0xc, &(0x7f0000000700), 0x0, &(0x7f0000001ec0)}, 0x0) add_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480), &(0x7f0000000880), 0x0, 0xfffffffffffffffb) request_key(&(0x7f00000002c0)='trusted\x00', &(0x7f0000000300), &(0x7f0000000380)='vboxnet1GPLeth1\x00', 0x0) add_key(&(0x7f0000000240)='dns_resolver\x00', &(0x7f0000000280), 0x0, 0x0, 0xffffffffffffffff) keyctl$assume_authority(0x10, 0x0) 03:33:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x43) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x3a, {{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}, 0x40}}}, 0x88) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) 03:33:46 executing program 4: mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0) pipe(&(0x7f0000000740)) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000980)="428055a0836969ef69dc00d9ce41ff0f1837374f021ac48f6818ccb6ffefffff0b4e2179fbade54175450f2e1a8fe95893cdc4433538e2900d64ac1e5d31a3b706656566460fe25a379f7f") 03:33:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x43) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x3a, {{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}, 0x40}}}, 0x88) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) 03:33:46 executing program 3: keyctl$dh_compute(0x14, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000002f00)=""/4096, &(0x7f0000000600)=0x1321) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:46 executing program 1: mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000780)=""/234) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000001c0)={{}, 'syz0\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000340)) syz_execute_func(&(0x7f00000003c0)="428055a0726969ef69dc00d99069203737c3397c2a068fa978dbc9c4a252f5ee4415406e9e7a9e01efe5e5417545c462010d420036f3e1003ef0f6585501ee31a3b786e2989f3643c144c900eb") openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000040)=""/58) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000680)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001080)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000019c0)) lstat(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b00)={{{@in=@loopback}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000001c00)=0xe8) lstat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@ipv4={[], [], @dev}, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000001e00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e40), &(0x7f0000001e80)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000000180)=@proc, 0xc, &(0x7f0000000700), 0x0, &(0x7f0000001ec0)}, 0x0) add_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480), &(0x7f0000000880), 0x0, 0xfffffffffffffffb) request_key(&(0x7f00000002c0)='trusted\x00', &(0x7f0000000300), &(0x7f0000000380)='vboxnet1GPLeth1\x00', 0x0) add_key(&(0x7f0000000240)='dns_resolver\x00', &(0x7f0000000280), 0x0, 0x0, 0xffffffffffffffff) keyctl$assume_authority(0x10, 0x0) 03:33:46 executing program 0: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000004c0)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000540)={0x2, 0x0, @dev}, &(0x7f0000000580)=0x10, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000005c0)={'bridge0\x00'}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000500)='cpuset\x00') epoll_create1(0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000480)='y\x00', 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)={@remote, @rand_addr}, 0x8) getgroups(0x0, &(0x7f0000000000)) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)) setregid(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:33:46 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffd) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x400000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) 03:33:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x43) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x3a, {{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}, 0x40}}}, 0x88) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) 03:33:47 executing program 4: mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0) pipe(&(0x7f0000000740)) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000980)="428055a0836969ef69dc00d9ce41ff0f1837374f021ac48f6818ccb6ffefffff0b4e2179fbade54175450f2e1a8fe95893cdc4433538e2900d64ac1e5d31a3b706656566460fe25a379f7f") 03:33:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x43) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x3a, {{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}, 0x40}}}, 0x88) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) 03:33:47 executing program 3: keyctl$dh_compute(0x14, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000002f00)=""/4096, &(0x7f0000000600)=0x1321) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:47 executing program 1: mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000780)=""/234) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000001c0)={{}, 'syz0\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000340)) syz_execute_func(&(0x7f00000003c0)="428055a0726969ef69dc00d99069203737c3397c2a068fa978dbc9c4a252f5ee4415406e9e7a9e01efe5e5417545c462010d420036f3e1003ef0f6585501ee31a3b786e2989f3643c144c900eb") openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000040)=""/58) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000680)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001080)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000019c0)) lstat(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b00)={{{@in=@loopback}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000001c00)=0xe8) lstat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@ipv4={[], [], @dev}, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000001e00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e40), &(0x7f0000001e80)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000000180)=@proc, 0xc, &(0x7f0000000700), 0x0, &(0x7f0000001ec0)}, 0x0) add_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480), &(0x7f0000000880), 0x0, 0xfffffffffffffffb) request_key(&(0x7f00000002c0)='trusted\x00', &(0x7f0000000300), &(0x7f0000000380)='vboxnet1GPLeth1\x00', 0x0) add_key(&(0x7f0000000240)='dns_resolver\x00', &(0x7f0000000280), 0x0, 0x0, 0xffffffffffffffff) keyctl$assume_authority(0x10, 0x0) 03:33:47 executing program 0: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000004c0)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000540)={0x2, 0x0, @dev}, &(0x7f0000000580)=0x10, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000005c0)={'bridge0\x00'}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000500)='cpuset\x00') epoll_create1(0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000480)='y\x00', 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)={@remote, @rand_addr}, 0x8) getgroups(0x0, &(0x7f0000000000)) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)) setregid(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:33:47 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffd) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x400000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) 03:33:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x43) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x3a, {{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}, 0x40}}}, 0x88) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) 03:33:48 executing program 4: mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0) pipe(&(0x7f0000000740)) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000980)="428055a0836969ef69dc00d9ce41ff0f1837374f021ac48f6818ccb6ffefffff0b4e2179fbade54175450f2e1a8fe95893cdc4433538e2900d64ac1e5d31a3b706656566460fe25a379f7f") 03:33:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x43) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x3a, {{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}, 0x40}}}, 0x88) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) 03:33:48 executing program 3: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000004700)=ANY=[], &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000380)=0x1c, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000300), 0xc) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={@local}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x14) accept(0xffffffffffffffff, &(0x7f0000000740)=@ll, &(0x7f00000006c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) clock_gettime(0x0, &(0x7f0000004680)) recvmmsg(0xffffffffffffffff, &(0x7f0000004480), 0x0, 0x0, &(0x7f00000046c0)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007740)={'ifb0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007780)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000007880)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000078c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007900)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007b00)={@ipv4={[], [], @broadcast}}, &(0x7f0000007b40)=0x2df) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000080c0)={@remote}, &(0x7f0000008100)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008140)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000008240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000008280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000082c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008300)={@local}, &(0x7f0000008340)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008380)={@loopback, @broadcast}, &(0x7f00000083c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008540)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000008580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000085c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000008c00)={&(0x7f0000000340), 0xc, &(0x7f0000008bc0)={&(0x7f0000004880)=ANY=[]}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:48 executing program 1: mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000780)=""/234) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000001c0)={{}, 'syz0\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000340)) syz_execute_func(&(0x7f00000003c0)="428055a0726969ef69dc00d99069203737c3397c2a068fa978dbc9c4a252f5ee4415406e9e7a9e01efe5e5417545c462010d420036f3e1003ef0f6585501ee31a3b786e2989f3643c144c900eb") openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000040)=""/58) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000680)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001080)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000019c0)) lstat(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b00)={{{@in=@loopback}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000001c00)=0xe8) lstat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@ipv4={[], [], @dev}, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000001e00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e40), &(0x7f0000001e80)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000000180)=@proc, 0xc, &(0x7f0000000700), 0x0, &(0x7f0000001ec0)}, 0x0) add_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480), &(0x7f0000000880), 0x0, 0xfffffffffffffffb) request_key(&(0x7f00000002c0)='trusted\x00', &(0x7f0000000300), &(0x7f0000000380)='vboxnet1GPLeth1\x00', 0x0) add_key(&(0x7f0000000240)='dns_resolver\x00', &(0x7f0000000280), 0x0, 0x0, 0xffffffffffffffff) keyctl$assume_authority(0x10, 0x0) 03:33:48 executing program 0: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000004c0)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000540)={0x2, 0x0, @dev}, &(0x7f0000000580)=0x10, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000005c0)={'bridge0\x00'}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000500)='cpuset\x00') epoll_create1(0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000480)='y\x00', 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)={@remote, @rand_addr}, 0x8) getgroups(0x0, &(0x7f0000000000)) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)) setregid(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:33:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000180)=""/11, 0x5) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000380)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) r4 = syz_open_pts(r0, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000140)) dup2(r2, r4) 03:33:49 executing program 3: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000004700)=ANY=[], &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000380)=0x1c, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000300), 0xc) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={@local}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x14) accept(0xffffffffffffffff, &(0x7f0000000740)=@ll, &(0x7f00000006c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) clock_gettime(0x0, &(0x7f0000004680)) recvmmsg(0xffffffffffffffff, &(0x7f0000004480), 0x0, 0x0, &(0x7f00000046c0)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007740)={'ifb0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007780)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000007880)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000078c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007900)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007b00)={@ipv4={[], [], @broadcast}}, &(0x7f0000007b40)=0x2df) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000080c0)={@remote}, &(0x7f0000008100)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008140)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000008240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000008280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000082c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008300)={@local}, &(0x7f0000008340)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008380)={@loopback, @broadcast}, &(0x7f00000083c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008540)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000008580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000085c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000008c00)={&(0x7f0000000340), 0xc, &(0x7f0000008bc0)={&(0x7f0000004880)=ANY=[]}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/10) msgget(0x3, 0x0) 03:33:49 executing program 4: unshare(0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)='mime_type\x00', 0xffffffffffffffff) request_key(&(0x7f00000007c0)='id_legacy\x00', &(0x7f0000000b40), &(0x7f0000000ac0)='keyring,selinux!vboxnet0$trusted\x00', 0x0) keyctl$setperm(0x5, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$update(0x2, 0x0, &(0x7f0000000780), 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000380)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000480), 0x4) io_setup(0x0, &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@local, @in6=@ipv4}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getuid() setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000700)={0x0, 'bond_slave_0\x00'}, 0x18) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@multicast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) getresgid(&(0x7f0000000400), &(0x7f0000000740), &(0x7f00000003c0)) getegid() getegid() getgroups(0x0, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) socket$packet(0x11, 0x0, 0x300) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000a80), 0x24, 0x0) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 03:33:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/10) msgget(0x3, 0x0) 03:33:49 executing program 3: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000004700)=ANY=[], &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000380)=0x1c, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000300), 0xc) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={@local}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x14) accept(0xffffffffffffffff, &(0x7f0000000740)=@ll, &(0x7f00000006c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) clock_gettime(0x0, &(0x7f0000004680)) recvmmsg(0xffffffffffffffff, &(0x7f0000004480), 0x0, 0x0, &(0x7f00000046c0)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007740)={'ifb0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007780)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000007880)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000078c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007900)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007b00)={@ipv4={[], [], @broadcast}}, &(0x7f0000007b40)=0x2df) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000080c0)={@remote}, &(0x7f0000008100)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008140)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000008240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000008280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000082c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008300)={@local}, &(0x7f0000008340)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008380)={@loopback, @broadcast}, &(0x7f00000083c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008540)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000008580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000085c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000008c00)={&(0x7f0000000340), 0xc, &(0x7f0000008bc0)={&(0x7f0000004880)=ANY=[]}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/10) msgget(0x3, 0x0) 03:33:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/10) msgget(0x3, 0x0) 03:33:49 executing program 3: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000004700)=ANY=[], &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000380)=0x1c, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000300), 0xc) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={@local}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x14) accept(0xffffffffffffffff, &(0x7f0000000740)=@ll, &(0x7f00000006c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) clock_gettime(0x0, &(0x7f0000004680)) recvmmsg(0xffffffffffffffff, &(0x7f0000004480), 0x0, 0x0, &(0x7f00000046c0)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007740)={'ifb0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007780)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000007880)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000078c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007900)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007b00)={@ipv4={[], [], @broadcast}}, &(0x7f0000007b40)=0x2df) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000080c0)={@remote}, &(0x7f0000008100)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008140)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000008240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000008280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000082c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008300)={@local}, &(0x7f0000008340)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008380)={@loopback, @broadcast}, &(0x7f00000083c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008540)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000008580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000085c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000008c00)={&(0x7f0000000340), 0xc, &(0x7f0000008bc0)={&(0x7f0000004880)=ANY=[]}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:49 executing program 5: fcntl$getown(0xffffffffffffff9c, 0x9) syz_open_procfs(0x0, &(0x7f0000000580)='net/netlink\x00') dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:33:49 executing program 1: lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000ac0)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) lstat(&(0x7f0000000c00)='./file1\x00', &(0x7f0000000c40)) setresuid(0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000f80)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001140)={@multicast1, @multicast1}, &(0x7f0000001180)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000011c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f00000012c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001300)={0x0, @loopback, @multicast1}, &(0x7f0000001340)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000014c0)={{{@in=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f00000015c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001600)={{{@in6, @in6}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b40)={@local}, &(0x7f0000002b80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002bc0)={{{@in6=@ipv4={[], [], @remote}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@ipv4}}, &(0x7f0000002cc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000003180)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b00)={0x0, @multicast1, @loopback}, &(0x7f0000008b40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000008b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008bc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008c00)={{{@in=@multicast2, @in6=@local}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000008d00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008e00)={{{@in6=@mcast2, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000008f00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008f40)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000d300)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000d340)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000d6c0)={{{@in6, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f000000d7c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000d940)={@broadcast, @rand_addr}, &(0x7f000000d980)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f000000d9c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000da00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000db00)={{{@in6, @in6}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@local}}, &(0x7f000000dc00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000130c0), 0x0, 0x0, &(0x7f0000013200)={0x0, 0x1c9c380}) getsockname$packet(0xffffffffffffffff, &(0x7f0000013300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013340)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000013380)={'dummy0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000133c0)={'vcan0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000013400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000013440)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000015000), 0x0, 0x0, &(0x7f00000150c0)={0x77359400}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000015ac0)={&(0x7f0000000200), 0xc, &(0x7f0000015a80)={&(0x7f0000015100)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getgid() getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) 03:33:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000180)=""/11, 0x5) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000380)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) r4 = syz_open_pts(r0, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000140)) dup2(r2, r4) 03:33:52 executing program 3: getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000040)) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) 03:33:52 executing program 5: fcntl$getown(0xffffffffffffff9c, 0x9) syz_open_procfs(0x0, &(0x7f0000000580)='net/netlink\x00') dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:33:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000180)=""/11, 0x5) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000380)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) r4 = syz_open_pts(r0, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000140)) dup2(r2, r4) 03:33:52 executing program 1: lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000ac0)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) lstat(&(0x7f0000000c00)='./file1\x00', &(0x7f0000000c40)) setresuid(0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000f80)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001140)={@multicast1, @multicast1}, &(0x7f0000001180)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000011c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f00000012c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001300)={0x0, @loopback, @multicast1}, &(0x7f0000001340)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000014c0)={{{@in=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f00000015c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001600)={{{@in6, @in6}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b40)={@local}, &(0x7f0000002b80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002bc0)={{{@in6=@ipv4={[], [], @remote}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@ipv4}}, &(0x7f0000002cc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000003180)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b00)={0x0, @multicast1, @loopback}, &(0x7f0000008b40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000008b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008bc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008c00)={{{@in=@multicast2, @in6=@local}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000008d00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008e00)={{{@in6=@mcast2, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000008f00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008f40)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000d300)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000d340)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000d6c0)={{{@in6, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f000000d7c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000d940)={@broadcast, @rand_addr}, &(0x7f000000d980)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f000000d9c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000da00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000db00)={{{@in6, @in6}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@local}}, &(0x7f000000dc00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000130c0), 0x0, 0x0, &(0x7f0000013200)={0x0, 0x1c9c380}) getsockname$packet(0xffffffffffffffff, &(0x7f0000013300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013340)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000013380)={'dummy0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000133c0)={'vcan0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000013400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000013440)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000015000), 0x0, 0x0, &(0x7f00000150c0)={0x77359400}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000015ac0)={&(0x7f0000000200), 0xc, &(0x7f0000015a80)={&(0x7f0000015100)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getgid() getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) 03:33:52 executing program 4: unshare(0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)='mime_type\x00', 0xffffffffffffffff) request_key(&(0x7f00000007c0)='id_legacy\x00', &(0x7f0000000b40), &(0x7f0000000ac0)='keyring,selinux!vboxnet0$trusted\x00', 0x0) keyctl$setperm(0x5, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$update(0x2, 0x0, &(0x7f0000000780), 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000380)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000480), 0x4) io_setup(0x0, &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@local, @in6=@ipv4}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getuid() setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000700)={0x0, 'bond_slave_0\x00'}, 0x18) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@multicast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) getresgid(&(0x7f0000000400), &(0x7f0000000740), &(0x7f00000003c0)) getegid() getegid() getgroups(0x0, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) socket$packet(0x11, 0x0, 0x300) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000a80), 0x24, 0x0) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 03:33:52 executing program 3: getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000040)) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) 03:33:52 executing program 3: getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000040)) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) 03:33:52 executing program 3: getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000040)) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) 03:33:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000180)=""/11, 0x5) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000380)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) r4 = syz_open_pts(r0, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000140)) dup2(r2, r4) 03:33:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000180)=""/11, 0x5) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000380)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) r4 = syz_open_pts(r0, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000140)) dup2(r2, r4) 03:33:52 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)) close(0xffffffffffffffff) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000d77000)=@abs, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)=ANY=[], &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) 03:33:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000180)=""/11, 0x5) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000380)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) r4 = syz_open_pts(r0, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000140)) dup2(r2, r4) 03:33:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000180)=""/11, 0x5) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000380)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) r4 = syz_open_pts(r0, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000140)) dup2(r2, r4) 03:33:52 executing program 5: fcntl$getown(0xffffffffffffff9c, 0x9) syz_open_procfs(0x0, &(0x7f0000000580)='net/netlink\x00') dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:33:52 executing program 1: lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000ac0)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) lstat(&(0x7f0000000c00)='./file1\x00', &(0x7f0000000c40)) setresuid(0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000f80)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001140)={@multicast1, @multicast1}, &(0x7f0000001180)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000011c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f00000012c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001300)={0x0, @loopback, @multicast1}, &(0x7f0000001340)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000014c0)={{{@in=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f00000015c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001600)={{{@in6, @in6}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b40)={@local}, &(0x7f0000002b80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002bc0)={{{@in6=@ipv4={[], [], @remote}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@ipv4}}, &(0x7f0000002cc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000003180)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b00)={0x0, @multicast1, @loopback}, &(0x7f0000008b40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000008b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008bc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008c00)={{{@in=@multicast2, @in6=@local}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000008d00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008e00)={{{@in6=@mcast2, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000008f00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008f40)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000d300)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000d340)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000d6c0)={{{@in6, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f000000d7c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000d940)={@broadcast, @rand_addr}, &(0x7f000000d980)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f000000d9c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000da00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000db00)={{{@in6, @in6}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@local}}, &(0x7f000000dc00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000130c0), 0x0, 0x0, &(0x7f0000013200)={0x0, 0x1c9c380}) getsockname$packet(0xffffffffffffffff, &(0x7f0000013300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013340)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000013380)={'dummy0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000133c0)={'vcan0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000013400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000013440)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000015000), 0x0, 0x0, &(0x7f00000150c0)={0x77359400}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000015ac0)={&(0x7f0000000200), 0xc, &(0x7f0000015a80)={&(0x7f0000015100)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getgid() getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) 03:33:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0xffffffffffffff8e) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) futex(&(0x7f0000000500)=0x2, 0x0, 0x0, &(0x7f00000005c0)={0x77359400}, &(0x7f0000000600), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r6 = add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000018c0)="a3be8ede202032c179a0ba7889a4a4316d9e85d76b6ab4168f24f28e08a5673e673f1335ed5a7f3dc0912aa7ffd1c8e1adbb29caa06fef8c5eaac49567fd3a35124ce9772c263748a0cbca9fe1a2ed13e5f146ffc298462316ef99d7d70aa8d849e8650193910b3d0d06d5b1618a0973eee186e9", 0x74, 0xfffffffffffffffd) memfd_create(&(0x7f0000000440)='\x00', 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000180), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f00000003c0)=0x68) r7 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x81, 0x4eca, 0x4f9, 0x5, 0x0, 0xb475, 0x43, 0x4, 0x7ff, 0xff, 0x5, 0x80000000, 0xffffffffffff66e7, 0x10001, 0x0, 0x3, 0x7ff, 0x1000, 0xffffffffffffce43, 0x2, 0xffffffffffffd230, 0x0, 0xfffffffffffffffb, 0x3, 0x4, 0x5, 0x9, 0x6, 0x8001, 0x8001, 0x7, 0x81, 0x3, 0x3, 0xd4, 0x3, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000640), 0xf}, 0x20000, 0x100000000, 0x6, 0x7, 0x2, 0x7, 0x8}, r7, 0xb, r5, 0x8) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000300)={0x3f, @multicast1, 0x4e23, 0x3, 'sh\x00', 0x8, 0x80000001, 0x11}, 0x2c) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000480)={{0x3, 0x30000000000}, 0x1, 0x2, 0x3f, {}, 0x2, 0x3}) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000540)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)) keyctl$get_security(0x11, r6, &(0x7f0000000340)=""/120, 0x78) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) 03:33:53 executing program 4: unshare(0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)='mime_type\x00', 0xffffffffffffffff) request_key(&(0x7f00000007c0)='id_legacy\x00', &(0x7f0000000b40), &(0x7f0000000ac0)='keyring,selinux!vboxnet0$trusted\x00', 0x0) keyctl$setperm(0x5, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$update(0x2, 0x0, &(0x7f0000000780), 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000380)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000480), 0x4) io_setup(0x0, &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@local, @in6=@ipv4}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getuid() setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000700)={0x0, 'bond_slave_0\x00'}, 0x18) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@multicast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) getresgid(&(0x7f0000000400), &(0x7f0000000740), &(0x7f00000003c0)) getegid() getegid() getgroups(0x0, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) socket$packet(0x11, 0x0, 0x300) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000a80), 0x24, 0x0) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 03:33:53 executing program 2: clock_gettime(0x9, &(0x7f0000000040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:53 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)) close(0xffffffffffffffff) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000d77000)=@abs, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)=ANY=[], &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) 03:33:53 executing program 5: fcntl$getown(0xffffffffffffff9c, 0x9) syz_open_procfs(0x0, &(0x7f0000000580)='net/netlink\x00') dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:33:53 executing program 1: lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000ac0)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) lstat(&(0x7f0000000c00)='./file1\x00', &(0x7f0000000c40)) setresuid(0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000f80)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001140)={@multicast1, @multicast1}, &(0x7f0000001180)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000011c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f00000012c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001300)={0x0, @loopback, @multicast1}, &(0x7f0000001340)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000014c0)={{{@in=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f00000015c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001600)={{{@in6, @in6}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b40)={@local}, &(0x7f0000002b80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002bc0)={{{@in6=@ipv4={[], [], @remote}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@ipv4}}, &(0x7f0000002cc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000003180)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b00)={0x0, @multicast1, @loopback}, &(0x7f0000008b40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000008b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008bc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008c00)={{{@in=@multicast2, @in6=@local}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000008d00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008e00)={{{@in6=@mcast2, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000008f00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008f40)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000d300)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000d340)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000d6c0)={{{@in6, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f000000d7c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000d940)={@broadcast, @rand_addr}, &(0x7f000000d980)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f000000d9c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000da00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000db00)={{{@in6, @in6}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@local}}, &(0x7f000000dc00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000130c0), 0x0, 0x0, &(0x7f0000013200)={0x0, 0x1c9c380}) getsockname$packet(0xffffffffffffffff, &(0x7f0000013300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013340)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000013380)={'dummy0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000133c0)={'vcan0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000013400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000013440)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000015000), 0x0, 0x0, &(0x7f00000150c0)={0x77359400}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000015ac0)={&(0x7f0000000200), 0xc, &(0x7f0000015a80)={&(0x7f0000015100)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getgid() getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) 03:33:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0xffffffffffffff8e) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) futex(&(0x7f0000000500)=0x2, 0x0, 0x0, &(0x7f00000005c0)={0x77359400}, &(0x7f0000000600), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r6 = add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000018c0)="a3be8ede202032c179a0ba7889a4a4316d9e85d76b6ab4168f24f28e08a5673e673f1335ed5a7f3dc0912aa7ffd1c8e1adbb29caa06fef8c5eaac49567fd3a35124ce9772c263748a0cbca9fe1a2ed13e5f146ffc298462316ef99d7d70aa8d849e8650193910b3d0d06d5b1618a0973eee186e9", 0x74, 0xfffffffffffffffd) memfd_create(&(0x7f0000000440)='\x00', 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000180), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f00000003c0)=0x68) r7 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x81, 0x4eca, 0x4f9, 0x5, 0x0, 0xb475, 0x43, 0x4, 0x7ff, 0xff, 0x5, 0x80000000, 0xffffffffffff66e7, 0x10001, 0x0, 0x3, 0x7ff, 0x1000, 0xffffffffffffce43, 0x2, 0xffffffffffffd230, 0x0, 0xfffffffffffffffb, 0x3, 0x4, 0x5, 0x9, 0x6, 0x8001, 0x8001, 0x7, 0x81, 0x3, 0x3, 0xd4, 0x3, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000640), 0xf}, 0x20000, 0x100000000, 0x6, 0x7, 0x2, 0x7, 0x8}, r7, 0xb, r5, 0x8) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000300)={0x3f, @multicast1, 0x4e23, 0x3, 'sh\x00', 0x8, 0x80000001, 0x11}, 0x2c) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000480)={{0x3, 0x30000000000}, 0x1, 0x2, 0x3f, {}, 0x2, 0x3}) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000540)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)) keyctl$get_security(0x11, r6, &(0x7f0000000340)=""/120, 0x78) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) 03:33:54 executing program 2: clock_gettime(0x9, &(0x7f0000000040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:54 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)) close(0xffffffffffffffff) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000d77000)=@abs, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)=ANY=[], &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) 03:33:54 executing program 4: unshare(0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)='mime_type\x00', 0xffffffffffffffff) request_key(&(0x7f00000007c0)='id_legacy\x00', &(0x7f0000000b40), &(0x7f0000000ac0)='keyring,selinux!vboxnet0$trusted\x00', 0x0) keyctl$setperm(0x5, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$update(0x2, 0x0, &(0x7f0000000780), 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000380)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000480), 0x4) io_setup(0x0, &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@local, @in6=@ipv4}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getuid() setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000700)={0x0, 'bond_slave_0\x00'}, 0x18) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@multicast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) getresgid(&(0x7f0000000400), &(0x7f0000000740), &(0x7f00000003c0)) getegid() getegid() getgroups(0x0, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) socket$packet(0x11, 0x0, 0x300) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000a80), 0x24, 0x0) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 03:33:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0xffffffffffffff8e) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) futex(&(0x7f0000000500)=0x2, 0x0, 0x0, &(0x7f00000005c0)={0x77359400}, &(0x7f0000000600), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r6 = add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000018c0)="a3be8ede202032c179a0ba7889a4a4316d9e85d76b6ab4168f24f28e08a5673e673f1335ed5a7f3dc0912aa7ffd1c8e1adbb29caa06fef8c5eaac49567fd3a35124ce9772c263748a0cbca9fe1a2ed13e5f146ffc298462316ef99d7d70aa8d849e8650193910b3d0d06d5b1618a0973eee186e9", 0x74, 0xfffffffffffffffd) memfd_create(&(0x7f0000000440)='\x00', 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000180), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f00000003c0)=0x68) r7 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x81, 0x4eca, 0x4f9, 0x5, 0x0, 0xb475, 0x43, 0x4, 0x7ff, 0xff, 0x5, 0x80000000, 0xffffffffffff66e7, 0x10001, 0x0, 0x3, 0x7ff, 0x1000, 0xffffffffffffce43, 0x2, 0xffffffffffffd230, 0x0, 0xfffffffffffffffb, 0x3, 0x4, 0x5, 0x9, 0x6, 0x8001, 0x8001, 0x7, 0x81, 0x3, 0x3, 0xd4, 0x3, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000640), 0xf}, 0x20000, 0x100000000, 0x6, 0x7, 0x2, 0x7, 0x8}, r7, 0xb, r5, 0x8) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000300)={0x3f, @multicast1, 0x4e23, 0x3, 'sh\x00', 0x8, 0x80000001, 0x11}, 0x2c) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000480)={{0x3, 0x30000000000}, 0x1, 0x2, 0x3f, {}, 0x2, 0x3}) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000540)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)) keyctl$get_security(0x11, r6, &(0x7f0000000340)=""/120, 0x78) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) 03:33:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0xffffffffffffff8e) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) futex(&(0x7f0000000500)=0x2, 0x0, 0x0, &(0x7f00000005c0)={0x77359400}, &(0x7f0000000600), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r6 = add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000018c0)="a3be8ede202032c179a0ba7889a4a4316d9e85d76b6ab4168f24f28e08a5673e673f1335ed5a7f3dc0912aa7ffd1c8e1adbb29caa06fef8c5eaac49567fd3a35124ce9772c263748a0cbca9fe1a2ed13e5f146ffc298462316ef99d7d70aa8d849e8650193910b3d0d06d5b1618a0973eee186e9", 0x74, 0xfffffffffffffffd) memfd_create(&(0x7f0000000440)='\x00', 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000180), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f00000003c0)=0x68) r7 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x81, 0x4eca, 0x4f9, 0x5, 0x0, 0xb475, 0x43, 0x4, 0x7ff, 0xff, 0x5, 0x80000000, 0xffffffffffff66e7, 0x10001, 0x0, 0x3, 0x7ff, 0x1000, 0xffffffffffffce43, 0x2, 0xffffffffffffd230, 0x0, 0xfffffffffffffffb, 0x3, 0x4, 0x5, 0x9, 0x6, 0x8001, 0x8001, 0x7, 0x81, 0x3, 0x3, 0xd4, 0x3, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000640), 0xf}, 0x20000, 0x100000000, 0x6, 0x7, 0x2, 0x7, 0x8}, r7, 0xb, r5, 0x8) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000300)={0x3f, @multicast1, 0x4e23, 0x3, 'sh\x00', 0x8, 0x80000001, 0x11}, 0x2c) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000480)={{0x3, 0x30000000000}, 0x1, 0x2, 0x3f, {}, 0x2, 0x3}) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000540)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)) keyctl$get_security(0x11, r6, &(0x7f0000000340)=""/120, 0x78) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) 03:33:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0xffffffffffffff8e) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) futex(&(0x7f0000000500)=0x2, 0x0, 0x0, &(0x7f00000005c0)={0x77359400}, &(0x7f0000000600), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r6 = add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000018c0)="a3be8ede202032c179a0ba7889a4a4316d9e85d76b6ab4168f24f28e08a5673e673f1335ed5a7f3dc0912aa7ffd1c8e1adbb29caa06fef8c5eaac49567fd3a35124ce9772c263748a0cbca9fe1a2ed13e5f146ffc298462316ef99d7d70aa8d849e8650193910b3d0d06d5b1618a0973eee186e9", 0x74, 0xfffffffffffffffd) memfd_create(&(0x7f0000000440)='\x00', 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000180), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f00000003c0)=0x68) r7 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x81, 0x4eca, 0x4f9, 0x5, 0x0, 0xb475, 0x43, 0x4, 0x7ff, 0xff, 0x5, 0x80000000, 0xffffffffffff66e7, 0x10001, 0x0, 0x3, 0x7ff, 0x1000, 0xffffffffffffce43, 0x2, 0xffffffffffffd230, 0x0, 0xfffffffffffffffb, 0x3, 0x4, 0x5, 0x9, 0x6, 0x8001, 0x8001, 0x7, 0x81, 0x3, 0x3, 0xd4, 0x3, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000640), 0xf}, 0x20000, 0x100000000, 0x6, 0x7, 0x2, 0x7, 0x8}, r7, 0xb, r5, 0x8) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000300)={0x3f, @multicast1, 0x4e23, 0x3, 'sh\x00', 0x8, 0x80000001, 0x11}, 0x2c) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000480)={{0x3, 0x30000000000}, 0x1, 0x2, 0x3f, {}, 0x2, 0x3}) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000540)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)) keyctl$get_security(0x11, r6, &(0x7f0000000340)=""/120, 0x78) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) 03:33:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0xffffffffffffff8e) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) futex(&(0x7f0000000500)=0x2, 0x0, 0x0, &(0x7f00000005c0)={0x77359400}, &(0x7f0000000600), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r6 = add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000018c0)="a3be8ede202032c179a0ba7889a4a4316d9e85d76b6ab4168f24f28e08a5673e673f1335ed5a7f3dc0912aa7ffd1c8e1adbb29caa06fef8c5eaac49567fd3a35124ce9772c263748a0cbca9fe1a2ed13e5f146ffc298462316ef99d7d70aa8d849e8650193910b3d0d06d5b1618a0973eee186e9", 0x74, 0xfffffffffffffffd) memfd_create(&(0x7f0000000440)='\x00', 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000180), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f00000003c0)=0x68) r7 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x81, 0x4eca, 0x4f9, 0x5, 0x0, 0xb475, 0x43, 0x4, 0x7ff, 0xff, 0x5, 0x80000000, 0xffffffffffff66e7, 0x10001, 0x0, 0x3, 0x7ff, 0x1000, 0xffffffffffffce43, 0x2, 0xffffffffffffd230, 0x0, 0xfffffffffffffffb, 0x3, 0x4, 0x5, 0x9, 0x6, 0x8001, 0x8001, 0x7, 0x81, 0x3, 0x3, 0xd4, 0x3, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000640), 0xf}, 0x20000, 0x100000000, 0x6, 0x7, 0x2, 0x7, 0x8}, r7, 0xb, r5, 0x8) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000300)={0x3f, @multicast1, 0x4e23, 0x3, 'sh\x00', 0x8, 0x80000001, 0x11}, 0x2c) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000480)={{0x3, 0x30000000000}, 0x1, 0x2, 0x3f, {}, 0x2, 0x3}) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000540)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)) keyctl$get_security(0x11, r6, &(0x7f0000000340)=""/120, 0x78) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) 03:33:55 executing program 2: clock_gettime(0x9, &(0x7f0000000040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0xffffffffffffff8e) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) futex(&(0x7f0000000500)=0x2, 0x0, 0x0, &(0x7f00000005c0)={0x77359400}, &(0x7f0000000600), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r6 = add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000018c0)="a3be8ede202032c179a0ba7889a4a4316d9e85d76b6ab4168f24f28e08a5673e673f1335ed5a7f3dc0912aa7ffd1c8e1adbb29caa06fef8c5eaac49567fd3a35124ce9772c263748a0cbca9fe1a2ed13e5f146ffc298462316ef99d7d70aa8d849e8650193910b3d0d06d5b1618a0973eee186e9", 0x74, 0xfffffffffffffffd) memfd_create(&(0x7f0000000440)='\x00', 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000180), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f00000003c0)=0x68) r7 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x81, 0x4eca, 0x4f9, 0x5, 0x0, 0xb475, 0x43, 0x4, 0x7ff, 0xff, 0x5, 0x80000000, 0xffffffffffff66e7, 0x10001, 0x0, 0x3, 0x7ff, 0x1000, 0xffffffffffffce43, 0x2, 0xffffffffffffd230, 0x0, 0xfffffffffffffffb, 0x3, 0x4, 0x5, 0x9, 0x6, 0x8001, 0x8001, 0x7, 0x81, 0x3, 0x3, 0xd4, 0x3, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000640), 0xf}, 0x20000, 0x100000000, 0x6, 0x7, 0x2, 0x7, 0x8}, r7, 0xb, r5, 0x8) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000300)={0x3f, @multicast1, 0x4e23, 0x3, 'sh\x00', 0x8, 0x80000001, 0x11}, 0x2c) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000480)={{0x3, 0x30000000000}, 0x1, 0x2, 0x3f, {}, 0x2, 0x3}) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000540)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)) keyctl$get_security(0x11, r6, &(0x7f0000000340)=""/120, 0x78) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) 03:33:55 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)) close(0xffffffffffffffff) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000d77000)=@abs, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)=ANY=[], &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) 03:33:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0xffffffffffffff8e) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) futex(&(0x7f0000000500)=0x2, 0x0, 0x0, &(0x7f00000005c0)={0x77359400}, &(0x7f0000000600), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r6 = add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000018c0)="a3be8ede202032c179a0ba7889a4a4316d9e85d76b6ab4168f24f28e08a5673e673f1335ed5a7f3dc0912aa7ffd1c8e1adbb29caa06fef8c5eaac49567fd3a35124ce9772c263748a0cbca9fe1a2ed13e5f146ffc298462316ef99d7d70aa8d849e8650193910b3d0d06d5b1618a0973eee186e9", 0x74, 0xfffffffffffffffd) memfd_create(&(0x7f0000000440)='\x00', 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000180), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f00000003c0)=0x68) r7 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x81, 0x4eca, 0x4f9, 0x5, 0x0, 0xb475, 0x43, 0x4, 0x7ff, 0xff, 0x5, 0x80000000, 0xffffffffffff66e7, 0x10001, 0x0, 0x3, 0x7ff, 0x1000, 0xffffffffffffce43, 0x2, 0xffffffffffffd230, 0x0, 0xfffffffffffffffb, 0x3, 0x4, 0x5, 0x9, 0x6, 0x8001, 0x8001, 0x7, 0x81, 0x3, 0x3, 0xd4, 0x3, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000640), 0xf}, 0x20000, 0x100000000, 0x6, 0x7, 0x2, 0x7, 0x8}, r7, 0xb, r5, 0x8) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000300)={0x3f, @multicast1, 0x4e23, 0x3, 'sh\x00', 0x8, 0x80000001, 0x11}, 0x2c) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000480)={{0x3, 0x30000000000}, 0x1, 0x2, 0x3f, {}, 0x2, 0x3}) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000540)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)) keyctl$get_security(0x11, r6, &(0x7f0000000340)=""/120, 0x78) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) 03:33:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0xffffffffffffff8e) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) futex(&(0x7f0000000500)=0x2, 0x0, 0x0, &(0x7f00000005c0)={0x77359400}, &(0x7f0000000600), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r6 = add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000018c0)="a3be8ede202032c179a0ba7889a4a4316d9e85d76b6ab4168f24f28e08a5673e673f1335ed5a7f3dc0912aa7ffd1c8e1adbb29caa06fef8c5eaac49567fd3a35124ce9772c263748a0cbca9fe1a2ed13e5f146ffc298462316ef99d7d70aa8d849e8650193910b3d0d06d5b1618a0973eee186e9", 0x74, 0xfffffffffffffffd) memfd_create(&(0x7f0000000440)='\x00', 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000180), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f00000003c0)=0x68) r7 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x81, 0x4eca, 0x4f9, 0x5, 0x0, 0xb475, 0x43, 0x4, 0x7ff, 0xff, 0x5, 0x80000000, 0xffffffffffff66e7, 0x10001, 0x0, 0x3, 0x7ff, 0x1000, 0xffffffffffffce43, 0x2, 0xffffffffffffd230, 0x0, 0xfffffffffffffffb, 0x3, 0x4, 0x5, 0x9, 0x6, 0x8001, 0x8001, 0x7, 0x81, 0x3, 0x3, 0xd4, 0x3, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000640), 0xf}, 0x20000, 0x100000000, 0x6, 0x7, 0x2, 0x7, 0x8}, r7, 0xb, r5, 0x8) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000300)={0x3f, @multicast1, 0x4e23, 0x3, 'sh\x00', 0x8, 0x80000001, 0x11}, 0x2c) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000480)={{0x3, 0x30000000000}, 0x1, 0x2, 0x3f, {}, 0x2, 0x3}) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000540)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)) keyctl$get_security(0x11, r6, &(0x7f0000000340)=""/120, 0x78) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) 03:33:55 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregs(0xc, r1, 0x0, &(0x7f0000000380)=""/38) 03:33:55 executing program 1: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$dmmidi(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000700)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000880)={0x0, @in={{0x2, 0x0, @broadcast}}}, 0x90) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000180)=0xfe31) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001a00)=ANY=[]) prctl$getname(0x10, &(0x7f0000000ac0)=""/133) munlockall() semget$private(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@local, @loopback}, 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140), &(0x7f00000001c0)=0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0), &(0x7f00000003c0)=0x100) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) keyctl$join(0x1, &(0x7f0000000140)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000200)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={@loopback}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'vcan0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={@rand_addr, @local}, &(0x7f0000000580)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@loopback, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000cc0)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000a40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@broadcast}}, &(0x7f0000000c00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c80)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@loopback, @in6=@local}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000010c0)={0x0, @empty, @remote}, &(0x7f0000001100)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001140)={@ipv4={[], [], @loopback}}, &(0x7f0000001180)=0x14) accept(0xffffffffffffffff, &(0x7f0000001400)=@can, &(0x7f0000001480)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000014c0)={@local}, &(0x7f0000001500)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004a00)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000004b00)=0xe8) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000004c0), &(0x7f0000000740)=0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000004b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004b80)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000780), &(0x7f00000007c0)=0x14) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000800), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005580)={'bpq0\x00'}) 03:33:55 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregs(0xc, r1, 0x0, &(0x7f0000000380)=""/38) 03:33:56 executing program 2: clock_gettime(0x9, &(0x7f0000000040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0xffffffffffffff8e) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) futex(&(0x7f0000000500)=0x2, 0x0, 0x0, &(0x7f00000005c0)={0x77359400}, &(0x7f0000000600), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r6 = add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000018c0)="a3be8ede202032c179a0ba7889a4a4316d9e85d76b6ab4168f24f28e08a5673e673f1335ed5a7f3dc0912aa7ffd1c8e1adbb29caa06fef8c5eaac49567fd3a35124ce9772c263748a0cbca9fe1a2ed13e5f146ffc298462316ef99d7d70aa8d849e8650193910b3d0d06d5b1618a0973eee186e9", 0x74, 0xfffffffffffffffd) memfd_create(&(0x7f0000000440)='\x00', 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000180), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f00000003c0)=0x68) r7 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x81, 0x4eca, 0x4f9, 0x5, 0x0, 0xb475, 0x43, 0x4, 0x7ff, 0xff, 0x5, 0x80000000, 0xffffffffffff66e7, 0x10001, 0x0, 0x3, 0x7ff, 0x1000, 0xffffffffffffce43, 0x2, 0xffffffffffffd230, 0x0, 0xfffffffffffffffb, 0x3, 0x4, 0x5, 0x9, 0x6, 0x8001, 0x8001, 0x7, 0x81, 0x3, 0x3, 0xd4, 0x3, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000640), 0xf}, 0x20000, 0x100000000, 0x6, 0x7, 0x2, 0x7, 0x8}, r7, 0xb, r5, 0x8) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000300)={0x3f, @multicast1, 0x4e23, 0x3, 'sh\x00', 0x8, 0x80000001, 0x11}, 0x2c) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000480)={{0x3, 0x30000000000}, 0x1, 0x2, 0x3f, {}, 0x2, 0x3}) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000540)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)) keyctl$get_security(0x11, r6, &(0x7f0000000340)=""/120, 0x78) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) 03:33:56 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregs(0xc, r1, 0x0, &(0x7f0000000380)=""/38) 03:33:56 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregs(0xc, r1, 0x0, &(0x7f0000000380)=""/38) 03:33:56 executing program 3: request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200), &(0x7f0000000240)=']-\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:56 executing program 0: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffe) pipe(&(0x7f00000001c0)) clock_getres(0x0, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000006c0)={'TPROXY\x00'}, &(0x7f0000000700)=0x1e) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x12, 0x5, 0xfa00, {&(0x7f00000008c0)}}, 0x18) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 03:33:56 executing program 1: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$dmmidi(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000700)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000880)={0x0, @in={{0x2, 0x0, @broadcast}}}, 0x90) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000180)=0xfe31) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001a00)=ANY=[]) prctl$getname(0x10, &(0x7f0000000ac0)=""/133) munlockall() semget$private(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@local, @loopback}, 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140), &(0x7f00000001c0)=0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0), &(0x7f00000003c0)=0x100) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) keyctl$join(0x1, &(0x7f0000000140)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000200)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={@loopback}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'vcan0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={@rand_addr, @local}, &(0x7f0000000580)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@loopback, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000cc0)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000a40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@broadcast}}, &(0x7f0000000c00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c80)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@loopback, @in6=@local}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000010c0)={0x0, @empty, @remote}, &(0x7f0000001100)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001140)={@ipv4={[], [], @loopback}}, &(0x7f0000001180)=0x14) accept(0xffffffffffffffff, &(0x7f0000001400)=@can, &(0x7f0000001480)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000014c0)={@local}, &(0x7f0000001500)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004a00)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000004b00)=0xe8) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000004c0), &(0x7f0000000740)=0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000004b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004b80)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000780), &(0x7f00000007c0)=0x14) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000800), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005580)={'bpq0\x00'}) 03:33:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) llistxattr(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)=""/4096, 0x1000) pipe2(&(0x7f0000001640), 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000003480)=ANY=[], &(0x7f00000044c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000080)) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0x80045500, &(0x7f0000001680)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgget$private(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) lstat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000340)}, 0x20) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000140)={'bridge0\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:33:57 executing program 5: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast2, 0x0, 0x1100, 'lblc\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x4}, &(0x7f0000000340)=0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f00000003c0)=""/190}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0xc43935a5b5fa5f40) openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x1, 0x0) r3 = msgget$private(0x0, 0x20) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000000c0)=""/68) 03:33:57 executing program 3: request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200), &(0x7f0000000240)=']-\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:57 executing program 5: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast2, 0x0, 0x1100, 'lblc\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x4}, &(0x7f0000000340)=0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f00000003c0)=""/190}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0xc43935a5b5fa5f40) openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x1, 0x0) r3 = msgget$private(0x0, 0x20) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000000c0)=""/68) 03:33:57 executing program 0: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffe) pipe(&(0x7f00000001c0)) clock_getres(0x0, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000006c0)={'TPROXY\x00'}, &(0x7f0000000700)=0x1e) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x12, 0x5, 0xfa00, {&(0x7f00000008c0)}}, 0x18) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 03:33:57 executing program 5: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast2, 0x0, 0x1100, 'lblc\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x4}, &(0x7f0000000340)=0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f00000003c0)=""/190}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0xc43935a5b5fa5f40) openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x1, 0x0) r3 = msgget$private(0x0, 0x20) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000000c0)=""/68) 03:33:57 executing program 5: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast2, 0x0, 0x1100, 'lblc\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x4}, &(0x7f0000000340)=0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f00000003c0)=""/190}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0xc43935a5b5fa5f40) openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x1, 0x0) r3 = msgget$private(0x0, 0x20) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000000c0)=""/68) 03:33:57 executing program 1: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$dmmidi(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000700)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000880)={0x0, @in={{0x2, 0x0, @broadcast}}}, 0x90) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000180)=0xfe31) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001a00)=ANY=[]) prctl$getname(0x10, &(0x7f0000000ac0)=""/133) munlockall() semget$private(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@local, @loopback}, 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140), &(0x7f00000001c0)=0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0), &(0x7f00000003c0)=0x100) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) keyctl$join(0x1, &(0x7f0000000140)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000200)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={@loopback}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'vcan0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={@rand_addr, @local}, &(0x7f0000000580)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@loopback, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000cc0)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000a40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@broadcast}}, &(0x7f0000000c00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c80)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@loopback, @in6=@local}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000010c0)={0x0, @empty, @remote}, &(0x7f0000001100)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001140)={@ipv4={[], [], @loopback}}, &(0x7f0000001180)=0x14) accept(0xffffffffffffffff, &(0x7f0000001400)=@can, &(0x7f0000001480)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000014c0)={@local}, &(0x7f0000001500)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004a00)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000004b00)=0xe8) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000004c0), &(0x7f0000000740)=0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000004b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004b80)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000780), &(0x7f00000007c0)=0x14) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000800), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005580)={'bpq0\x00'}) 03:33:57 executing program 1: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) syz_open_dev$dmmidi(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000700)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000880)={0x0, @in={{0x2, 0x0, @broadcast}}}, 0x90) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000180)=0xfe31) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001a00)=ANY=[]) prctl$getname(0x10, &(0x7f0000000ac0)=""/133) munlockall() semget$private(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@local, @loopback}, 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140), &(0x7f00000001c0)=0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0), &(0x7f00000003c0)=0x100) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:57 executing program 5: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast2, 0x0, 0x1100, 'lblc\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x4}, &(0x7f0000000340)=0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f00000003c0)=""/190}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0xc43935a5b5fa5f40) openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x1, 0x0) r3 = msgget$private(0x0, 0x20) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000000c0)=""/68) 03:33:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) llistxattr(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)=""/4096, 0x1000) pipe2(&(0x7f0000001640), 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000003480)=ANY=[], &(0x7f00000044c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000080)) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0x80045500, &(0x7f0000001680)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgget$private(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) lstat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000340)}, 0x20) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000140)={'bridge0\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:33:58 executing program 3: request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200), &(0x7f0000000240)=']-\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:58 executing program 5: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast2, 0x0, 0x1100, 'lblc\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x4}, &(0x7f0000000340)=0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f00000003c0)=""/190}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0xc43935a5b5fa5f40) openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x1, 0x0) r3 = msgget$private(0x0, 0x20) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000000c0)=""/68) 03:33:58 executing program 0: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffe) pipe(&(0x7f00000001c0)) clock_getres(0x0, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000006c0)={'TPROXY\x00'}, &(0x7f0000000700)=0x1e) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x12, 0x5, 0xfa00, {&(0x7f00000008c0)}}, 0x18) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 03:33:58 executing program 5: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast2, 0x0, 0x1100, 'lblc\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x4}, &(0x7f0000000340)=0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f00000003c0)=""/190}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0xc43935a5b5fa5f40) openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x1, 0x0) r3 = msgget$private(0x0, 0x20) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000000c0)=""/68) 03:33:58 executing program 5: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast2, 0x0, 0x1100, 'lblc\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x4}, &(0x7f0000000340)=0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f00000003c0)=""/190}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0xc43935a5b5fa5f40) openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x1, 0x0) r3 = msgget$private(0x0, 0x20) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000000c0)=""/68) 03:33:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) keyctl$join(0x1, &(0x7f0000000140)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000200)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={@loopback}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'vcan0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={@rand_addr, @local}, &(0x7f0000000580)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@loopback, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000cc0)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000a40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@broadcast}}, &(0x7f0000000c00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c80)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@loopback, @in6=@local}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000010c0)={0x0, @empty, @remote}, &(0x7f0000001100)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001140)={@ipv4={[], [], @loopback}}, &(0x7f0000001180)=0x14) accept(0xffffffffffffffff, &(0x7f0000001400)=@can, &(0x7f0000001480)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000014c0)={@local}, &(0x7f0000001500)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004a00)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000004b00)=0xe8) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000004c0), &(0x7f0000000740)=0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000004b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004b80)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000780), &(0x7f00000007c0)=0x14) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000800), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005580)={'bpq0\x00'}) 03:33:58 executing program 5: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast2, 0x0, 0x1100, 'lblc\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x4}, &(0x7f0000000340)=0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f00000003c0)=""/190}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0xc43935a5b5fa5f40) openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x1, 0x0) r3 = msgget$private(0x0, 0x20) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000000c0)=""/68) 03:33:58 executing program 1: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast2, 0x0, 0x1100, 'lblc\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x4}, &(0x7f0000000340)=0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f00000003c0)=""/190}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0xc43935a5b5fa5f40) openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x1, 0x0) r3 = msgget$private(0x0, 0x20) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000000c0)=""/68) 03:33:58 executing program 5: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast2, 0x0, 0x1100, 'lblc\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x4}, &(0x7f0000000340)=0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f00000003c0)=""/190}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0xc43935a5b5fa5f40) openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x1, 0x0) r3 = msgget$private(0x0, 0x20) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000000c0)=""/68) 03:33:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) llistxattr(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)=""/4096, 0x1000) pipe2(&(0x7f0000001640), 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000003480)=ANY=[], &(0x7f00000044c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000080)) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0x80045500, &(0x7f0000001680)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgget$private(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) lstat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000340)}, 0x20) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000140)={'bridge0\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:33:58 executing program 3: request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200), &(0x7f0000000240)=']-\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:59 executing program 5: shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp6\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:59 executing program 1: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast2, 0x0, 0x1100, 'lblc\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x4}, &(0x7f0000000340)=0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f00000003c0)=""/190}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0xc43935a5b5fa5f40) openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x1, 0x0) r3 = msgget$private(0x0, 0x20) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000000c0)=""/68) 03:33:59 executing program 0: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffe) pipe(&(0x7f00000001c0)) clock_getres(0x0, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000006c0)={'TPROXY\x00'}, &(0x7f0000000700)=0x1e) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x12, 0x5, 0xfa00, {&(0x7f00000008c0)}}, 0x18) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 03:33:59 executing program 1: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast2, 0x0, 0x1100, 'lblc\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x4}, &(0x7f0000000340)=0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f00000003c0)=""/190}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0xc43935a5b5fa5f40) openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x1, 0x0) r3 = msgget$private(0x0, 0x20) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000000c0)=""/68) 03:33:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000080)=0x2df, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) sendmmsg$alg(r1, &(0x7f0000005240)=[{0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f00000029c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendmsg$xdp(r1, &(0x7f0000004f40)={&(0x7f0000002b00), 0x10, &(0x7f0000004ec0)=[{&(0x7f0000002e00)="0ac5be086bdd0f2ed3329c34f95ec920f282a05abd2f2c5a7ccc63a2abf90ab7a9164c41a2b853abbf26191fa872e214247300b0101ef40dbc696bbed3f2fe216331e1a2f4318469a930ebe1f38d0d281bc963cb2f3d394ab4a0368fa5929293648399b47fe71930ff29edbf33eb8010aa3e0238eece6fca53d259deb051b01f75", 0x81}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000980)={&(0x7f0000000540)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000680)=""/106, 0xff26}], 0x1, &(0x7f0000000900)=""/103, 0x67}, 0x0) 03:33:59 executing program 4: membarrier(0x0, 0x0) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) fcntl$getown(0xffffffffffffffff, 0x9) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) inotify_init1(0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x1ae) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000440)) getsockopt$bt_hci(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/25, &(0x7f0000000240)=0x262) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)=0x10, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, &(0x7f0000000200)) syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") 03:33:59 executing program 3: prctl$intptr(0x59616d61, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000400)) socket$inet6(0xa, 0x1000000000002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) llistxattr(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)=""/4096, 0x1000) pipe2(&(0x7f0000001640), 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000003480)=ANY=[], &(0x7f00000044c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000080)) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0x80045500, &(0x7f0000001680)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgget$private(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) lstat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000340)}, 0x20) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000140)={'bridge0\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:33:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80040000000002, &(0x7f00000000c0)=0x65, 0x4) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x3f8, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0xd470041877f0fcc9) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r0, 0x1) 03:34:00 executing program 5: shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp6\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:00 executing program 0: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000b40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80040000000002, &(0x7f00000000c0)=0x65, 0x4) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x3f8, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0xd470041877f0fcc9) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r0, 0x1) 03:34:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80040000000002, &(0x7f00000000c0)=0x65, 0x4) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x3f8, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0xd470041877f0fcc9) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r0, 0x1) 03:34:00 executing program 4: membarrier(0x0, 0x0) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) fcntl$getown(0xffffffffffffffff, 0x9) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) inotify_init1(0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x1ae) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000440)) getsockopt$bt_hci(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/25, &(0x7f0000000240)=0x262) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)=0x10, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, &(0x7f0000000200)) syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") 03:34:00 executing program 3: prctl$intptr(0x59616d61, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000400)) socket$inet6(0xa, 0x1000000000002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f00000001c0), 0x8) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) syz_open_procfs(0x0, &(0x7f00000003c0)='net/sockstat6\x00') setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000800)=ANY=[], 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@broadcast, @dev}, 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000440), 0xc, &(0x7f0000000a00)={&(0x7f0000000880)={0x14}, 0x14}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000780)={{}, {0xa, 0x0, 0x0, @remote}}, 0x5c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000200)="776c616e31933a266b657972696e67706f7369785f61636c5f6163636573732e2f5b7365637572697479243a255be39e7573657200"}, 0x10) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) 03:34:01 executing program 5: shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp6\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80040000000002, &(0x7f00000000c0)=0x65, 0x4) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x3f8, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0xd470041877f0fcc9) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r0, 0x1) 03:34:01 executing program 0: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000b40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x4030582a) 03:34:01 executing program 4: membarrier(0x0, 0x0) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) fcntl$getown(0xffffffffffffffff, 0x9) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) inotify_init1(0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x1ae) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000440)) getsockopt$bt_hci(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/25, &(0x7f0000000240)=0x262) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)=0x10, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, &(0x7f0000000200)) syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") [ 1164.794272] EXT4-fs warning (device sda1): ext4_block_to_path:107: block 1076910122 > max in inode 16636 [ 1164.881652] EXT4-fs warning (device sda1): ext4_block_to_path:107: block 1076910122 > max in inode 16636 03:34:01 executing program 3: prctl$intptr(0x59616d61, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000400)) socket$inet6(0xa, 0x1000000000002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x4030582a) [ 1165.120092] EXT4-fs warning (device sda1): ext4_block_to_path:107: block 1076910122 > max in inode 16636 03:34:01 executing program 5: shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp6\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x4030582a) 03:34:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f00000001c0), 0x8) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) syz_open_procfs(0x0, &(0x7f00000003c0)='net/sockstat6\x00') setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000800)=ANY=[], 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@broadcast, @dev}, 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000440), 0xc, &(0x7f0000000a00)={&(0x7f0000000880)={0x14}, 0x14}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000780)={{}, {0xa, 0x0, 0x0, @remote}}, 0x5c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000200)="776c616e31933a266b657972696e67706f7369785f61636c5f6163636573732e2f5b7365637572697479243a255be39e7573657200"}, 0x10) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) 03:34:02 executing program 0: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000b40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 1165.342080] EXT4-fs warning (device sda1): ext4_block_to_path:107: block 1076910122 > max in inode 16633 03:34:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x4030582a) [ 1165.488388] EXT4-fs warning (device sda1): ext4_block_to_path:107: block 1076910122 > max in inode 16633 03:34:02 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) msgget$private(0x0, 0x0) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000140)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000200)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000400)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:02 executing program 4: membarrier(0x0, 0x0) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) fcntl$getown(0xffffffffffffffff, 0x9) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) inotify_init1(0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x1ae) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000440)) getsockopt$bt_hci(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/25, &(0x7f0000000240)=0x262) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)=0x10, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, &(0x7f0000000200)) syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") 03:34:02 executing program 3: prctl$intptr(0x59616d61, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000400)) socket$inet6(0xa, 0x1000000000002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:02 executing program 5: keyctl$set_reqkey_keyring(0xd, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000006c0)=0xe8) getrusage(0x0, &(0x7f0000000480)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000700)={@loopback}) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280), 0x10, &(0x7f0000000340)={&(0x7f00000002c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "5802ed284662e1ce0e6e6d91e9ab2609a9ddfafc21e6139319d1dc634d95dfae29b9f7ed4b2fd955929529af41dfd234365d1b9c0d2fe9f96848414a1c68fe6f"}, 0x48}}, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000040), 0x0) msgget$private(0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000540)=""/68) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) pipe2(&(0x7f0000000040), 0x0) 03:34:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f00000001c0), 0x8) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) syz_open_procfs(0x0, &(0x7f00000003c0)='net/sockstat6\x00') setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000800)=ANY=[], 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@broadcast, @dev}, 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000440), 0xc, &(0x7f0000000a00)={&(0x7f0000000880)={0x14}, 0x14}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000780)={{}, {0xa, 0x0, 0x0, @remote}}, 0x5c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000200)="776c616e31933a266b657972696e67706f7369785f61636c5f6163636573732e2f5b7365637572697479243a255be39e7573657200"}, 0x10) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) 03:34:02 executing program 0: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000b40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:03 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) msgget$private(0x0, 0x0) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000140)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000200)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000400)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:03 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) msgget$private(0x0, 0x0) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000140)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000200)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000400)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:03 executing program 4: prctl$intptr(0x1b, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000002c0), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000d00)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c40)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) gettid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000540), 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000580), &(0x7f00000005c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000c80)=ANY=[], &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000e00), 0x20) 03:34:03 executing program 3: memfd_create(&(0x7f0000000480)='vmnet1\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000280)) 03:34:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f00000001c0), 0x8) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) syz_open_procfs(0x0, &(0x7f00000003c0)='net/sockstat6\x00') setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000800)=ANY=[], 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@broadcast, @dev}, 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000440), 0xc, &(0x7f0000000a00)={&(0x7f0000000880)={0x14}, 0x14}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000780)={{}, {0xa, 0x0, 0x0, @remote}}, 0x5c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000200)="776c616e31933a266b657972696e67706f7369785f61636c5f6163636573732e2f5b7365637572697479243a255be39e7573657200"}, 0x10) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) 03:34:03 executing program 5: keyctl$set_reqkey_keyring(0xd, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000006c0)=0xe8) getrusage(0x0, &(0x7f0000000480)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000700)={@loopback}) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280), 0x10, &(0x7f0000000340)={&(0x7f00000002c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "5802ed284662e1ce0e6e6d91e9ab2609a9ddfafc21e6139319d1dc634d95dfae29b9f7ed4b2fd955929529af41dfd234365d1b9c0d2fe9f96848414a1c68fe6f"}, 0x48}}, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000040), 0x0) msgget$private(0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000540)=""/68) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) pipe2(&(0x7f0000000040), 0x0) 03:34:03 executing program 0: pipe(&(0x7f0000000080)) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f00000000c0)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) memfd_create(&(0x7f0000000040)='ip_vti0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000380)=0x14) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0xe8) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:04 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) msgget$private(0x0, 0x0) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000140)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000200)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000400)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:04 executing program 3: memfd_create(&(0x7f0000000480)='vmnet1\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000280)) 03:34:04 executing program 4: prctl$intptr(0x1b, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000002c0), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000d00)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c40)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) gettid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000540), 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000580), &(0x7f00000005c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000c80)=ANY=[], &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000e00), 0x20) 03:34:04 executing program 5: keyctl$set_reqkey_keyring(0xd, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000006c0)=0xe8) getrusage(0x0, &(0x7f0000000480)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000700)={@loopback}) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280), 0x10, &(0x7f0000000340)={&(0x7f00000002c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "5802ed284662e1ce0e6e6d91e9ab2609a9ddfafc21e6139319d1dc634d95dfae29b9f7ed4b2fd955929529af41dfd234365d1b9c0d2fe9f96848414a1c68fe6f"}, 0x48}}, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000040), 0x0) msgget$private(0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000540)=""/68) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) pipe2(&(0x7f0000000040), 0x0) 03:34:04 executing program 2: shmget$private(0x7000005, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000240)=0xc) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:04 executing program 0: pipe(&(0x7f0000000080)) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f00000000c0)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) memfd_create(&(0x7f0000000040)='ip_vti0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000380)=0x14) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0xe8) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:05 executing program 3: memfd_create(&(0x7f0000000480)='vmnet1\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000280)) 03:34:05 executing program 1: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b00)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) gettid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000042c0)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000000b40), 0x0, &(0x7f00000041c0)}, 0x0) getegid() getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000009c0)='syz1\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getgroups(0x0, &(0x7f0000000800)) 03:34:05 executing program 4: prctl$intptr(0x1b, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000002c0), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000d00)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c40)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) gettid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000540), 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000580), &(0x7f00000005c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000c80)=ANY=[], &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000e00), 0x20) 03:34:05 executing program 5: keyctl$set_reqkey_keyring(0xd, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000006c0)=0xe8) getrusage(0x0, &(0x7f0000000480)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000700)={@loopback}) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280), 0x10, &(0x7f0000000340)={&(0x7f00000002c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "5802ed284662e1ce0e6e6d91e9ab2609a9ddfafc21e6139319d1dc634d95dfae29b9f7ed4b2fd955929529af41dfd234365d1b9c0d2fe9f96848414a1c68fe6f"}, 0x48}}, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000040), 0x0) msgget$private(0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000540)=""/68) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) pipe2(&(0x7f0000000040), 0x0) 03:34:05 executing program 2: shmget$private(0x7000005, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000240)=0xc) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:05 executing program 0: pipe(&(0x7f0000000080)) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f00000000c0)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) memfd_create(&(0x7f0000000040)='ip_vti0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000380)=0x14) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0xe8) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:06 executing program 3: memfd_create(&(0x7f0000000480)='vmnet1\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000280)) 03:34:06 executing program 1: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b00)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) gettid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000042c0)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000000b40), 0x0, &(0x7f00000041c0)}, 0x0) getegid() getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000009c0)='syz1\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getgroups(0x0, &(0x7f0000000800)) 03:34:06 executing program 1: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b00)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) gettid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000042c0)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000000b40), 0x0, &(0x7f00000041c0)}, 0x0) getegid() getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000009c0)='syz1\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getgroups(0x0, &(0x7f0000000800)) 03:34:06 executing program 4: prctl$intptr(0x1b, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000002c0), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000d00)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c40)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) gettid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000540), 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000580), &(0x7f00000005c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000c80)=ANY=[], &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000e00), 0x20) 03:34:06 executing program 5: ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040)={0xffffffff00000000}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ashmem(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ashmem\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da051c4220daf9e5e7eaf2747dd93c15a00000dde41cbff9191a33d062900770f78993d233d2341150f6eee6239f6f6fa39f60f383027c4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000080)) ppoll(&(0x7f00000000c0), 0x0, &(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f0000000280), 0x8) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x0, 0x0, "643a509b42fd6b0b4135b18e40c35fb55a7733c6f1710f3ccdd612d308dc6662b45852c43aae19294bf8d346bf51618e3813288d20a716719cdd8adb32abbcd1414afc840e51f306d82c04a7234b0ca3"}, 0xd8) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000380)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000005c0), &(0x7f0000000800)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x84) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000340)=0x80, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000500)=ANY=[], 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={@empty, @remote}, &(0x7f0000000580)=0xc) syz_genetlink_get_family_id$nbd(&(0x7f0000000640)='nbd\x00') socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000d40)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000b00)) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f00000008c0), 0xc, &(0x7f0000000a80)={&(0x7f0000000500)=ANY=[]}}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000600), 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x14}, 0x14}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 03:34:06 executing program 2: shmget$private(0x7000005, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000240)=0xc) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:06 executing program 0: pipe(&(0x7f0000000080)) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f00000000c0)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) memfd_create(&(0x7f0000000040)='ip_vti0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000380)=0x14) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0xe8) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:07 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000cecffc), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000240)=0x1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:34:07 executing program 1: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b00)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) gettid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000042c0)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000000b40), 0x0, &(0x7f00000041c0)}, 0x0) getegid() getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000009c0)='syz1\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getgroups(0x0, &(0x7f0000000800)) [ 1170.518051] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:07 executing program 4: clock_gettime(0xfd010000, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:07 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000cecffc), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000240)=0x1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:34:07 executing program 2: shmget$private(0x7000005, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000240)=0xc) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 1170.766049] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:07 executing program 5: ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040)={0xffffffff00000000}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ashmem(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ashmem\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da051c4220daf9e5e7eaf2747dd93c15a00000dde41cbff9191a33d062900770f78993d233d2341150f6eee6239f6f6fa39f60f383027c4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000080)) ppoll(&(0x7f00000000c0), 0x0, &(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f0000000280), 0x8) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x0, 0x0, "643a509b42fd6b0b4135b18e40c35fb55a7733c6f1710f3ccdd612d308dc6662b45852c43aae19294bf8d346bf51618e3813288d20a716719cdd8adb32abbcd1414afc840e51f306d82c04a7234b0ca3"}, 0xd8) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000380)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000005c0), &(0x7f0000000800)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x84) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000340)=0x80, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000500)=ANY=[], 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={@empty, @remote}, &(0x7f0000000580)=0xc) syz_genetlink_get_family_id$nbd(&(0x7f0000000640)='nbd\x00') socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000d40)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000b00)) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f00000008c0), 0xc, &(0x7f0000000a80)={&(0x7f0000000500)=ANY=[]}}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000600), 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x14}, 0x14}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 03:34:07 executing program 0: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x7, 0x0, {{0x7, ',vmnet0'}}}, 0x14) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000180)=0x10) getpeername$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs, &(0x7f0000000540)=0x6e) 03:34:07 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000cecffc), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000240)=0x1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 1171.066680] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:07 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000cecffc), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000240)=0x1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 1171.341202] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0xfffffffffffffe0c}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x0, 0x0) 03:34:08 executing program 4: clock_gettime(0xfd010000, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000240)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) readv(0xffffffffffffffff, &(0x7f00000005c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0)) recvmmsg(0xffffffffffffffff, &(0x7f00000060c0), 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000062c0), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_open_dev$mice(&(0x7f0000000500)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000001b40), 0x4) syz_open_procfs(0x0, &(0x7f0000000880)='net/mcfilter\x00') listen(0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) delete_module(&(0x7f0000005b40)='cgroup\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000200)) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380)={0x77359400}, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000340), 0xc) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@local, @in=@loopback}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xfffffffffffffcb9) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[]}}, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000001c0)=""/51) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) capset(&(0x7f00000000c0), &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f0000000640)='meps\x00') munlock(&(0x7f0000fea000/0x14000)=nil, 0x14000) 03:34:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0xfffffffffffffe0c}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x0, 0x0) 03:34:08 executing program 2: keyctl$dh_compute(0x13, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0xfffffffffffffe0c}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x0, 0x0) 03:34:08 executing program 5: ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040)={0xffffffff00000000}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ashmem(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ashmem\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da051c4220daf9e5e7eaf2747dd93c15a00000dde41cbff9191a33d062900770f78993d233d2341150f6eee6239f6f6fa39f60f383027c4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000080)) ppoll(&(0x7f00000000c0), 0x0, &(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f0000000280), 0x8) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x0, 0x0, "643a509b42fd6b0b4135b18e40c35fb55a7733c6f1710f3ccdd612d308dc6662b45852c43aae19294bf8d346bf51618e3813288d20a716719cdd8adb32abbcd1414afc840e51f306d82c04a7234b0ca3"}, 0xd8) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000380)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000005c0), &(0x7f0000000800)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x84) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000340)=0x80, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000500)=ANY=[], 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={@empty, @remote}, &(0x7f0000000580)=0xc) syz_genetlink_get_family_id$nbd(&(0x7f0000000640)='nbd\x00') socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000d40)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000b00)) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f00000008c0), 0xc, &(0x7f0000000a80)={&(0x7f0000000500)=ANY=[]}}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000600), 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x14}, 0x14}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 03:34:08 executing program 0: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x7, 0x0, {{0x7, ',vmnet0'}}}, 0x14) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000180)=0x10) getpeername$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs, &(0x7f0000000540)=0x6e) 03:34:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0xfffffffffffffe0c}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x0, 0x0) 03:34:08 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000640)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000940)={0x9, 0x6f, 0x1}, 0x9) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) write$P9_RLOCK(r2, &(0x7f00000007c0)={0x4}, 0x0) 03:34:09 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000640)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000940)={0x9, 0x6f, 0x1}, 0x9) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) write$P9_RLOCK(r2, &(0x7f00000007c0)={0x4}, 0x0) 03:34:09 executing program 4: clock_gettime(0xfd010000, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000240)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) readv(0xffffffffffffffff, &(0x7f00000005c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0)) recvmmsg(0xffffffffffffffff, &(0x7f00000060c0), 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000062c0), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_open_dev$mice(&(0x7f0000000500)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000001b40), 0x4) syz_open_procfs(0x0, &(0x7f0000000880)='net/mcfilter\x00') listen(0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) delete_module(&(0x7f0000005b40)='cgroup\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000200)) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380)={0x77359400}, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000340), 0xc) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@local, @in=@loopback}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xfffffffffffffcb9) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[]}}, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000001c0)=""/51) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) capset(&(0x7f00000000c0), &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f0000000640)='meps\x00') munlock(&(0x7f0000fea000/0x14000)=nil, 0x14000) 03:34:09 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000640)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000940)={0x9, 0x6f, 0x1}, 0x9) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) write$P9_RLOCK(r2, &(0x7f00000007c0)={0x4}, 0x0) 03:34:09 executing program 2: keyctl$dh_compute(0x13, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:09 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000640)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000940)={0x9, 0x6f, 0x1}, 0x9) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) write$P9_RLOCK(r2, &(0x7f00000007c0)={0x4}, 0x0) 03:34:09 executing program 0: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x7, 0x0, {{0x7, ',vmnet0'}}}, 0x14) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000180)=0x10) getpeername$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs, &(0x7f0000000540)=0x6e) 03:34:09 executing program 5: ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040)={0xffffffff00000000}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ashmem(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ashmem\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da051c4220daf9e5e7eaf2747dd93c15a00000dde41cbff9191a33d062900770f78993d233d2341150f6eee6239f6f6fa39f60f383027c4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000080)) ppoll(&(0x7f00000000c0), 0x0, &(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f0000000280), 0x8) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x0, 0x0, "643a509b42fd6b0b4135b18e40c35fb55a7733c6f1710f3ccdd612d308dc6662b45852c43aae19294bf8d346bf51618e3813288d20a716719cdd8adb32abbcd1414afc840e51f306d82c04a7234b0ca3"}, 0xd8) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000380)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000005c0), &(0x7f0000000800)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x84) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000340)=0x80, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000500)=ANY=[], 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={@empty, @remote}, &(0x7f0000000580)=0xc) syz_genetlink_get_family_id$nbd(&(0x7f0000000640)='nbd\x00') socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000d40)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000b00)) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f00000008c0), 0xc, &(0x7f0000000a80)={&(0x7f0000000500)=ANY=[]}}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000600), 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x14}, 0x14}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 03:34:09 executing program 1: prctl$setname(0x24, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) dup(0xffffffffffffffff) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "c3c7f00418be0017d8aa1a1c1d646d2879707a57d32ce49dd0e10c79808086c5"}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@remote, @in6=@ipv4={[], [], @multicast2}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) prctl$setfpexc(0xc, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'team0\x00'}) openat$dir(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000300)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006440)={0x0, @dev, @multicast2}, &(0x7f0000006480)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={@loopback, @local, @mcast2}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, &(0x7f00000005c0), 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006600)={{{@in6=@mcast1, @in=@dev}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006780)={@multicast1, @broadcast}, &(0x7f00000067c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:34:10 executing program 4: clock_gettime(0xfd010000, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000240)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) readv(0xffffffffffffffff, &(0x7f00000005c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0)) recvmmsg(0xffffffffffffffff, &(0x7f00000060c0), 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000062c0), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_open_dev$mice(&(0x7f0000000500)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000001b40), 0x4) syz_open_procfs(0x0, &(0x7f0000000880)='net/mcfilter\x00') listen(0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) delete_module(&(0x7f0000005b40)='cgroup\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000200)) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380)={0x77359400}, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000340), 0xc) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@local, @in=@loopback}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xfffffffffffffcb9) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[]}}, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000001c0)=""/51) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) capset(&(0x7f00000000c0), &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f0000000640)='meps\x00') munlock(&(0x7f0000fea000/0x14000)=nil, 0x14000) 03:34:10 executing program 2: keyctl$dh_compute(0x13, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:10 executing program 0: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x7, 0x0, {{0x7, ',vmnet0'}}}, 0x14) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000180)=0x10) getpeername$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs, &(0x7f0000000540)=0x6e) 03:34:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 03:34:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 03:34:10 executing program 1: prctl$setname(0x24, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) dup(0xffffffffffffffff) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "c3c7f00418be0017d8aa1a1c1d646d2879707a57d32ce49dd0e10c79808086c5"}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@remote, @in6=@ipv4={[], [], @multicast2}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) prctl$setfpexc(0xc, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'team0\x00'}) openat$dir(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000300)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006440)={0x0, @dev, @multicast2}, &(0x7f0000006480)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={@loopback, @local, @mcast2}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, &(0x7f00000005c0), 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006600)={{{@in6=@mcast1, @in=@dev}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006780)={@multicast1, @broadcast}, &(0x7f00000067c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:34:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 03:34:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 03:34:11 executing program 5: clock_nanosleep(0xffc99a3b, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) set_tid_address(&(0x7f00000001c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)) socket$inet6(0xa, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f00000005c0)=""/160, 0xa0) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, 0x1c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='io.stat\x00', 0x0, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000340), &(0x7f00000003c0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000140), 0x2) 03:34:11 executing program 4: getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001d40)) gettid() dup(0xffffffffffffffff) fchmodat(0xffffffffffffffff, &(0x7f0000004480)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000021c0)) getpgrp(0x0) getpgrp(0xffffffffffffffff) getpgid(0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'veth0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001e00)={@ipv4={[], [], @multicast2}}, &(0x7f0000001e40)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000004380), 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002000)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000002100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002200)={{{@in=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000002300)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002380)=0x14, 0x0) 03:34:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000240)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) readv(0xffffffffffffffff, &(0x7f00000005c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0)) recvmmsg(0xffffffffffffffff, &(0x7f00000060c0), 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000062c0), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_open_dev$mice(&(0x7f0000000500)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000001b40), 0x4) syz_open_procfs(0x0, &(0x7f0000000880)='net/mcfilter\x00') listen(0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) delete_module(&(0x7f0000005b40)='cgroup\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000200)) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380)={0x77359400}, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000340), 0xc) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@local, @in=@loopback}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xfffffffffffffcb9) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[]}}, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000001c0)=""/51) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) capset(&(0x7f00000000c0), &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f0000000640)='meps\x00') munlock(&(0x7f0000fea000/0x14000)=nil, 0x14000) 03:34:11 executing program 2: keyctl$dh_compute(0x13, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:11 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4208, r1, 0x0, &(0x7f0000000080)) ptrace$setregset(0x4205, r1, 0x0, &(0x7f0000000040)={&(0x7f0000000200)}) 03:34:11 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4208, r1, 0x0, &(0x7f0000000080)) ptrace$setregset(0x4205, r1, 0x0, &(0x7f0000000040)={&(0x7f0000000200)}) 03:34:11 executing program 1: prctl$setname(0x24, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) dup(0xffffffffffffffff) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "c3c7f00418be0017d8aa1a1c1d646d2879707a57d32ce49dd0e10c79808086c5"}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@remote, @in6=@ipv4={[], [], @multicast2}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) prctl$setfpexc(0xc, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'team0\x00'}) openat$dir(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000300)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006440)={0x0, @dev, @multicast2}, &(0x7f0000006480)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={@loopback, @local, @mcast2}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, &(0x7f00000005c0), 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006600)={{{@in6=@mcast1, @in=@dev}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006780)={@multicast1, @broadcast}, &(0x7f00000067c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:34:11 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4208, r1, 0x0, &(0x7f0000000080)) ptrace$setregset(0x4205, r1, 0x0, &(0x7f0000000040)={&(0x7f0000000200)}) 03:34:11 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4208, r1, 0x0, &(0x7f0000000080)) ptrace$setregset(0x4205, r1, 0x0, &(0x7f0000000040)={&(0x7f0000000200)}) 03:34:11 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4208, r1, 0x0, &(0x7f0000000080)) ptrace$setregset(0x4205, r1, 0x0, &(0x7f0000000040)={&(0x7f0000000200)}) 03:34:12 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4208, r1, 0x0, &(0x7f0000000080)) ptrace$setregset(0x4205, r1, 0x0, &(0x7f0000000040)={&(0x7f0000000200)}) 03:34:12 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4208, r1, 0x0, &(0x7f0000000080)) ptrace$setregset(0x4205, r1, 0x0, &(0x7f0000000040)={&(0x7f0000000200)}) 03:34:12 executing program 5: clock_nanosleep(0xffc99a3b, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) set_tid_address(&(0x7f00000001c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)) socket$inet6(0xa, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f00000005c0)=""/160, 0xa0) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, 0x1c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='io.stat\x00', 0x0, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000340), &(0x7f00000003c0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000140), 0x2) 03:34:12 executing program 4: getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001d40)) gettid() dup(0xffffffffffffffff) fchmodat(0xffffffffffffffff, &(0x7f0000004480)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000021c0)) getpgrp(0x0) getpgrp(0xffffffffffffffff) getpgid(0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'veth0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001e00)={@ipv4={[], [], @multicast2}}, &(0x7f0000001e40)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000004380), 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002000)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000002100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002200)={{{@in=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000002300)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002380)=0x14, 0x0) 03:34:12 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4208, r1, 0x0, &(0x7f0000000080)) ptrace$setregset(0x4205, r1, 0x0, &(0x7f0000000040)={&(0x7f0000000200)}) 03:34:12 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4208, r1, 0x0, &(0x7f0000000080)) ptrace$setregset(0x4205, r1, 0x0, &(0x7f0000000040)={&(0x7f0000000200)}) 03:34:12 executing program 2: sysfs$2(0x2, 0x0, &(0x7f00000001c0)=""/182) eventfd(0x0) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80)={@loopback}, &(0x7f0000000bc0)=0x14) fstat(0xffffffffffffffff, &(0x7f0000000340)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x0) clock_getres(0x0, &(0x7f0000000400)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:12 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4208, r1, 0x0, &(0x7f0000000080)) ptrace$setregset(0x4205, r1, 0x0, &(0x7f0000000040)={&(0x7f0000000200)}) 03:34:12 executing program 1: prctl$setname(0x24, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) dup(0xffffffffffffffff) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "c3c7f00418be0017d8aa1a1c1d646d2879707a57d32ce49dd0e10c79808086c5"}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@remote, @in6=@ipv4={[], [], @multicast2}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) prctl$setfpexc(0xc, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'team0\x00'}) openat$dir(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000300)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006440)={0x0, @dev, @multicast2}, &(0x7f0000006480)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={@loopback, @local, @mcast2}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, &(0x7f00000005c0), 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006600)={{{@in6=@mcast1, @in=@dev}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006780)={@multicast1, @broadcast}, &(0x7f00000067c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:34:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r1, 0x0, 0x400000000000003, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0x10) 03:34:12 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x1d, &(0x7f0000000000), 0x4) 03:34:12 executing program 2: sysfs$2(0x2, 0x0, &(0x7f00000001c0)=""/182) eventfd(0x0) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80)={@loopback}, &(0x7f0000000bc0)=0x14) fstat(0xffffffffffffffff, &(0x7f0000000340)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x0) clock_getres(0x0, &(0x7f0000000400)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:12 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x1d, &(0x7f0000000000), 0x4) 03:34:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r1, 0x0, 0x400000000000003, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0x10) 03:34:13 executing program 5: clock_nanosleep(0xffc99a3b, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) set_tid_address(&(0x7f00000001c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)) socket$inet6(0xa, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f00000005c0)=""/160, 0xa0) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, 0x1c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='io.stat\x00', 0x0, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000340), &(0x7f00000003c0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000140), 0x2) 03:34:13 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x1d, &(0x7f0000000000), 0x4) 03:34:13 executing program 2: sysfs$2(0x2, 0x0, &(0x7f00000001c0)=""/182) eventfd(0x0) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80)={@loopback}, &(0x7f0000000bc0)=0x14) fstat(0xffffffffffffffff, &(0x7f0000000340)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x0) clock_getres(0x0, &(0x7f0000000400)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r1, 0x0, 0x400000000000003, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0x10) 03:34:13 executing program 4: getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001d40)) gettid() dup(0xffffffffffffffff) fchmodat(0xffffffffffffffff, &(0x7f0000004480)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000021c0)) getpgrp(0x0) getpgrp(0xffffffffffffffff) getpgid(0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'veth0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001e00)={@ipv4={[], [], @multicast2}}, &(0x7f0000001e40)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000004380), 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002000)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000002100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002200)={{{@in=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000002300)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002380)=0x14, 0x0) 03:34:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r1, 0x0, 0x400000000000003, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0x10) 03:34:13 executing program 0: r0 = memfd_create(&(0x7f0000000080)='#! ', 0x3) write$binfmt_script(r0, &(0x7f0000000880)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 03:34:13 executing program 1: dup(0xffffffffffffffff) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000a00)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}}, 0x90) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) gettid() ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"}) semget$private(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f0000000740)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)) 03:34:13 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x1d, &(0x7f0000000000), 0x4) 03:34:13 executing program 2: sysfs$2(0x2, 0x0, &(0x7f00000001c0)=""/182) eventfd(0x0) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80)={@loopback}, &(0x7f0000000bc0)=0x14) fstat(0xffffffffffffffff, &(0x7f0000000340)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x0) clock_getres(0x0, &(0x7f0000000400)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:13 executing program 0: r0 = memfd_create(&(0x7f0000000080)='#! ', 0x3) write$binfmt_script(r0, &(0x7f0000000880)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 03:34:13 executing program 3: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000100)="1f0000000104ff00fd4354c007110000f305014008000100010423dcffdf00", 0x1f) r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) write(r1, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305030008000100010423dcffdf00", 0x1f) r2 = socket(0x10, 0x2, 0xc) write(r2, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) [ 1176.824410] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 1176.842792] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 1176.867193] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 1176.914880] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 1176.953192] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 1176.953754] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 1176.981222] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 1176.999929] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. 03:34:13 executing program 5: clock_nanosleep(0xffc99a3b, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) set_tid_address(&(0x7f00000001c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)) socket$inet6(0xa, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f00000005c0)=""/160, 0xa0) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, 0x1c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='io.stat\x00', 0x0, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000340), &(0x7f00000003c0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000140), 0x2) 03:34:13 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x11, 0x2, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 03:34:13 executing program 0: r0 = memfd_create(&(0x7f0000000080)='#! ', 0x3) write$binfmt_script(r0, &(0x7f0000000880)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 03:34:13 executing program 3: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000100)="1f0000000104ff00fd4354c007110000f305014008000100010423dcffdf00", 0x1f) r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) write(r1, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305030008000100010423dcffdf00", 0x1f) r2 = socket(0x10, 0x2, 0xc) write(r2, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) 03:34:13 executing program 4: getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001d40)) gettid() dup(0xffffffffffffffff) fchmodat(0xffffffffffffffff, &(0x7f0000004480)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000021c0)) getpgrp(0x0) getpgrp(0xffffffffffffffff) getpgid(0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'veth0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001e00)={@ipv4={[], [], @multicast2}}, &(0x7f0000001e40)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000004380), 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002000)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000002100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002200)={{{@in=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000002300)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002380)=0x14, 0x0) [ 1177.189666] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. 03:34:13 executing program 0: r0 = memfd_create(&(0x7f0000000080)='#! ', 0x3) write$binfmt_script(r0, &(0x7f0000000880)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) [ 1177.232099] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. 03:34:14 executing program 3: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000100)="1f0000000104ff00fd4354c007110000f305014008000100010423dcffdf00", 0x1f) r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) write(r1, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305030008000100010423dcffdf00", 0x1f) r2 = socket(0x10, 0x2, 0xc) write(r2, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) 03:34:14 executing program 1: dup(0xffffffffffffffff) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000a00)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}}, 0x90) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) gettid() ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"}) semget$private(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f0000000740)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)) 03:34:14 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x11, 0x2, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 03:34:14 executing program 0: eventfd2(0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) pwritev(0xffffffffffffffff, &(0x7f0000003440), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f00000002c0)='/dev/snd/timer\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203737c3397c2ac4611311dd8f4978c73264a7400f01ef417545d8ec2e1a6901460f01ee30215da57e35988613980f1a09") openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000240)=0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000280)='scalable\x00', 0x9) socket$key(0xf, 0x3, 0x2) syz_open_dev$sndtimer(&(0x7f00000003c0)='/dev/snd/timer\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='em1,cgroup\x00'}, 0x10) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f00000035c0)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) close(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000440)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000003540)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000034c0)={@ipv4={[], [], @local}}, &(0x7f0000003500)=0x14) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) socket$inet6_udplite(0xa, 0x2, 0x88) 03:34:14 executing program 3: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000100)="1f0000000104ff00fd4354c007110000f305014008000100010423dcffdf00", 0x1f) r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) write(r1, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305030008000100010423dcffdf00", 0x1f) r2 = socket(0x10, 0x2, 0xc) write(r2, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) 03:34:14 executing program 3: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x4800002, 0x4831, 0xffffffffffffffff, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000012ff8)='./file0\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) remap_file_pages(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) [ 1177.791323] audit: type=1326 audit(2000000054.542:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11238 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:14 executing program 0: eventfd2(0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) pwritev(0xffffffffffffffff, &(0x7f0000003440), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f00000002c0)='/dev/snd/timer\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203737c3397c2ac4611311dd8f4978c73264a7400f01ef417545d8ec2e1a6901460f01ee30215da57e35988613980f1a09") openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000240)=0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000280)='scalable\x00', 0x9) socket$key(0xf, 0x3, 0x2) syz_open_dev$sndtimer(&(0x7f00000003c0)='/dev/snd/timer\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='em1,cgroup\x00'}, 0x10) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f00000035c0)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) close(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000440)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000003540)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000034c0)={@ipv4={[], [], @local}}, &(0x7f0000003500)=0x14) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) socket$inet6_udplite(0xa, 0x2, 0x88) 03:34:14 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) accept(0xffffffffffffffff, &(0x7f00000007c0)=@generic, &(0x7f0000000540)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffffb) openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x0, 0x0) add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) socket$nl_route(0x10, 0x3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getpgrp(0x0) sched_setparam(0x0, &(0x7f0000000500)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)={0x0, @rand_addr, @local}, &(0x7f0000000680)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000400)) 03:34:14 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x11, 0x2, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 03:34:14 executing program 3: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x4800002, 0x4831, 0xffffffffffffffff, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000012ff8)='./file0\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) remap_file_pages(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 03:34:14 executing program 4: sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) getegid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003480)={{{@in6=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000003580)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000003640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003680)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003780)=0xe8) lstat(&(0x7f00000037c0)='./file0\x00', &(0x7f0000003800)) stat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)) getpid() stat(&(0x7f0000003c00)='./file0\x00', &(0x7f0000003c40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000003e00)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000006600), &(0x7f0000006640)=0xc) stat(&(0x7f0000006680)='./file0\x00', &(0x7f00000066c0)) fstat(0xffffffffffffffff, &(0x7f0000006740)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000067c0)) lstat(&(0x7f0000006800)='./file0\x00', &(0x7f0000006840)) getgroups(0x0, &(0x7f00000068c0)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000006900)) fstat(0xffffffffffffffff, &(0x7f0000006980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 03:34:14 executing program 3: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x4800002, 0x4831, 0xffffffffffffffff, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000012ff8)='./file0\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) remap_file_pages(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 03:34:14 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x11, 0x2, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1178.341341] audit: type=1326 audit(2000000055.092:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11256 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:15 executing program 1: dup(0xffffffffffffffff) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000a00)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}}, 0x90) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) gettid() ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"}) semget$private(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f0000000740)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)) 03:34:15 executing program 3: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x4800002, 0x4831, 0xffffffffffffffff, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000012ff8)='./file0\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) remap_file_pages(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 03:34:15 executing program 4: sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) getegid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003480)={{{@in6=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000003580)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000003640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003680)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003780)=0xe8) lstat(&(0x7f00000037c0)='./file0\x00', &(0x7f0000003800)) stat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)) getpid() stat(&(0x7f0000003c00)='./file0\x00', &(0x7f0000003c40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000003e00)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000006600), &(0x7f0000006640)=0xc) stat(&(0x7f0000006680)='./file0\x00', &(0x7f00000066c0)) fstat(0xffffffffffffffff, &(0x7f0000006740)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000067c0)) lstat(&(0x7f0000006800)='./file0\x00', &(0x7f0000006840)) getgroups(0x0, &(0x7f00000068c0)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000006900)) fstat(0xffffffffffffffff, &(0x7f0000006980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 03:34:15 executing program 2: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x800, @dev}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=[{0xfffffdb7}], 0x10}, 0x0) 03:34:15 executing program 2: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x800, @dev}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=[{0xfffffdb7}], 0x10}, 0x0) 03:34:15 executing program 0: eventfd2(0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) pwritev(0xffffffffffffffff, &(0x7f0000003440), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f00000002c0)='/dev/snd/timer\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203737c3397c2ac4611311dd8f4978c73264a7400f01ef417545d8ec2e1a6901460f01ee30215da57e35988613980f1a09") openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000240)=0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000280)='scalable\x00', 0x9) socket$key(0xf, 0x3, 0x2) syz_open_dev$sndtimer(&(0x7f00000003c0)='/dev/snd/timer\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='em1,cgroup\x00'}, 0x10) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f00000035c0)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) close(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000440)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000003540)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000034c0)={@ipv4={[], [], @local}}, &(0x7f0000003500)=0x14) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) socket$inet6_udplite(0xa, 0x2, 0x88) 03:34:15 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) accept(0xffffffffffffffff, &(0x7f00000007c0)=@generic, &(0x7f0000000540)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffffb) openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x0, 0x0) add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) socket$nl_route(0x10, 0x3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getpgrp(0x0) sched_setparam(0x0, &(0x7f0000000500)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)={0x0, @rand_addr, @local}, &(0x7f0000000680)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000400)) 03:34:15 executing program 3: seccomp(0x0, 0x0, &(0x7f0000001980)={0x0, &(0x7f0000000580)}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f0000000540)=0x8) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x3f, @local}, 0xffffffffffffffff, 0xffff}}, 0x48) write$binfmt_aout(r3, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1c5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) r5 = socket(0x15, 0x0, 0x0) r6 = getpgrp(0xffffffffffffffff) rt_sigqueueinfo(r6, 0x8, &(0x7f0000000680)={0x3b, 0xe9d2, 0x8, 0x10000}) sendfile(r3, r3, &(0x7f00000000c0), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') tee(r0, r2, 0x100000001, 0x4) sendmsg$IPVS_CMD_SET_SERVICE(r5, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xc0820000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="000125bd7000fcdbdf25020000001c0002000800050001010000080002004e240000080004008baf00000800"], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x80) accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000640)={0x0, 0x200, 0x1, 0x5, r4}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000500)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e20, 0x8, @empty, 0x5}], 0x2c) 03:34:15 executing program 4: sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) getegid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003480)={{{@in6=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000003580)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000003640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003680)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003780)=0xe8) lstat(&(0x7f00000037c0)='./file0\x00', &(0x7f0000003800)) stat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)) getpid() stat(&(0x7f0000003c00)='./file0\x00', &(0x7f0000003c40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000003e00)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000006600), &(0x7f0000006640)=0xc) stat(&(0x7f0000006680)='./file0\x00', &(0x7f00000066c0)) fstat(0xffffffffffffffff, &(0x7f0000006740)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000067c0)) lstat(&(0x7f0000006800)='./file0\x00', &(0x7f0000006840)) getgroups(0x0, &(0x7f00000068c0)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000006900)) fstat(0xffffffffffffffff, &(0x7f0000006980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 03:34:15 executing program 2: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x800, @dev}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=[{0xfffffdb7}], 0x10}, 0x0) [ 1179.087882] audit: type=1326 audit(2000000055.832:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11296 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:15 executing program 2: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x800, @dev}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=[{0xfffffdb7}], 0x10}, 0x0) 03:34:16 executing program 2: syz_emit_ethernet(0x10000002d, &(0x7f00000002c0)={@link_local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty, {[@ra={0x94, 0x6}, @rr={0x7, 0x3}]}}, @gre}}}}, 0x0) 03:34:16 executing program 1: dup(0xffffffffffffffff) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000a00)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}}, 0x90) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) gettid() ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"}) semget$private(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f0000000740)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)) 03:34:16 executing program 4: sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) getegid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003480)={{{@in6=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000003580)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000003640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003680)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003780)=0xe8) lstat(&(0x7f00000037c0)='./file0\x00', &(0x7f0000003800)) stat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)) getpid() stat(&(0x7f0000003c00)='./file0\x00', &(0x7f0000003c40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000003e00)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000006600), &(0x7f0000006640)=0xc) stat(&(0x7f0000006680)='./file0\x00', &(0x7f00000066c0)) fstat(0xffffffffffffffff, &(0x7f0000006740)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000067c0)) lstat(&(0x7f0000006800)='./file0\x00', &(0x7f0000006840)) getgroups(0x0, &(0x7f00000068c0)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000006900)) fstat(0xffffffffffffffff, &(0x7f0000006980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 03:34:16 executing program 2: syz_emit_ethernet(0x10000002d, &(0x7f00000002c0)={@link_local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty, {[@ra={0x94, 0x6}, @rr={0x7, 0x3}]}}, @gre}}}}, 0x0) 03:34:16 executing program 2: syz_emit_ethernet(0x10000002d, &(0x7f00000002c0)={@link_local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty, {[@ra={0x94, 0x6}, @rr={0x7, 0x3}]}}, @gre}}}}, 0x0) 03:34:16 executing program 0: eventfd2(0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) pwritev(0xffffffffffffffff, &(0x7f0000003440), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f00000002c0)='/dev/snd/timer\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203737c3397c2ac4611311dd8f4978c73264a7400f01ef417545d8ec2e1a6901460f01ee30215da57e35988613980f1a09") openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000240)=0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000280)='scalable\x00', 0x9) socket$key(0xf, 0x3, 0x2) syz_open_dev$sndtimer(&(0x7f00000003c0)='/dev/snd/timer\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='em1,cgroup\x00'}, 0x10) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f00000035c0)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) close(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000440)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000003540)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000034c0)={@ipv4={[], [], @local}}, &(0x7f0000003500)=0x14) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) socket$inet6_udplite(0xa, 0x2, 0x88) 03:34:16 executing program 2: syz_emit_ethernet(0x10000002d, &(0x7f00000002c0)={@link_local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty, {[@ra={0x94, 0x6}, @rr={0x7, 0x3}]}}, @gre}}}}, 0x0) 03:34:16 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) accept(0xffffffffffffffff, &(0x7f00000007c0)=@generic, &(0x7f0000000540)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffffb) openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x0, 0x0) add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) socket$nl_route(0x10, 0x3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getpgrp(0x0) sched_setparam(0x0, &(0x7f0000000500)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)={0x0, @rand_addr, @local}, &(0x7f0000000680)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000400)) 03:34:16 executing program 3: seccomp(0x0, 0x0, &(0x7f0000001980)={0x0, &(0x7f0000000580)}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f0000000540)=0x8) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x3f, @local}, 0xffffffffffffffff, 0xffff}}, 0x48) write$binfmt_aout(r3, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1c5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) r5 = socket(0x15, 0x0, 0x0) r6 = getpgrp(0xffffffffffffffff) rt_sigqueueinfo(r6, 0x8, &(0x7f0000000680)={0x3b, 0xe9d2, 0x8, 0x10000}) sendfile(r3, r3, &(0x7f00000000c0), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') tee(r0, r2, 0x100000001, 0x4) sendmsg$IPVS_CMD_SET_SERVICE(r5, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xc0820000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="000125bd7000fcdbdf25020000001c0002000800050001010000080002004e240000080004008baf00000800"], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x80) accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000640)={0x0, 0x200, 0x1, 0x5, r4}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000500)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e20, 0x8, @empty, 0x5}], 0x2c) 03:34:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") seccomp(0x0, 0x0, &(0x7f0000000180)={0x337, &(0x7f0000000140)}) readlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/44, 0x2c) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x0, "5ffaa0237c858ddf75e3937722d61668124687f9283efd9e58d4b7341bc6a3041471ae513be923ca4a75ea79d13d1464fac8be8186b8f1b3792e46830928455b5d2a3c558cb70471aa5c0cf998189d00"}, 0xd8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000003c0)=0x14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000200)={0x77359400}, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000ac0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000c00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000dc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@remote}}}, &(0x7f00000014c0)=0xe8) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in6, @in=@local}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001600)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001640), &(0x7f0000001680)=0xc) getresuid(&(0x7f00000016c0), &(0x7f0000001700), &(0x7f0000001740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002d80)={{{@in6=@local, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000002e80)=0xe8) stat(&(0x7f0000002ec0)='./file0\x00', &(0x7f0000002f00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002f80)) fstat(0xffffffffffffffff, &(0x7f0000002fc0)) getresgid(&(0x7f0000003040), &(0x7f0000003080), &(0x7f00000030c0)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() lstat(&(0x7f0000003100)='./file0/file0\x00', &(0x7f0000003140)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) fstat(0xffffffffffffffff, &(0x7f0000003240)) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003940), &(0x7f0000003980)=0xc) getgid() getpgrp(0xffffffffffffffff) getresuid(&(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)) getgid() getpid() lstat(&(0x7f0000003f40)='./file0\x00', &(0x7f0000003f80)) 03:34:16 executing program 2: mkdir(&(0x7f0000000980)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f00000015c0)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000000240)=""/147, 0x1f}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0xf9e1221a8413ff5d, 0x0, &(0x7f0000002e40)={0x77359400}) recvmmsg(0xffffffffffffffff, &(0x7f0000006340)=[{{&(0x7f0000002840)=@l2, 0x80, &(0x7f0000002dc0)=[{&(0x7f00000028c0)=""/220, 0xdc}, {&(0x7f00000029c0)=""/214, 0xd6}], 0x2, &(0x7f0000002d40)=""/47, 0x2f}}], 0x1, 0x0, &(0x7f0000006400)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000400), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) dup(0xffffffffffffffff) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchmod(r1, 0xa) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000000)) 03:34:17 executing program 2: mkdir(&(0x7f0000000980)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f00000015c0)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000000240)=""/147, 0x1f}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0xf9e1221a8413ff5d, 0x0, &(0x7f0000002e40)={0x77359400}) recvmmsg(0xffffffffffffffff, &(0x7f0000006340)=[{{&(0x7f0000002840)=@l2, 0x80, &(0x7f0000002dc0)=[{&(0x7f00000028c0)=""/220, 0xdc}, {&(0x7f00000029c0)=""/214, 0xd6}], 0x2, &(0x7f0000002d40)=""/47, 0x2f}}], 0x1, 0x0, &(0x7f0000006400)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000400), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) dup(0xffffffffffffffff) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchmod(r1, 0xa) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000000)) 03:34:17 executing program 0: mkdir(&(0x7f0000000980)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f00000015c0)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000000240)=""/147, 0x1f}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0xf9e1221a8413ff5d, 0x0, &(0x7f0000002e40)={0x77359400}) recvmmsg(0xffffffffffffffff, &(0x7f0000006340)=[{{&(0x7f0000002840)=@l2, 0x80, &(0x7f0000002dc0)=[{&(0x7f00000028c0)=""/220, 0xdc}, {&(0x7f00000029c0)=""/214, 0xd6}], 0x2, &(0x7f0000002d40)=""/47, 0x2f}}], 0x1, 0x0, &(0x7f0000006400)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000400), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) dup(0xffffffffffffffff) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchmod(r1, 0xa) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000000)) 03:34:17 executing program 1: seccomp(0x0, 0x0, &(0x7f0000001980)={0x0, &(0x7f0000000580)}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f0000000540)=0x8) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x3f, @local}, 0xffffffffffffffff, 0xffff}}, 0x48) write$binfmt_aout(r3, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1c5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) r5 = socket(0x15, 0x0, 0x0) r6 = getpgrp(0xffffffffffffffff) rt_sigqueueinfo(r6, 0x8, &(0x7f0000000680)={0x3b, 0xe9d2, 0x8, 0x10000}) sendfile(r3, r3, &(0x7f00000000c0), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') tee(r0, r2, 0x100000001, 0x4) sendmsg$IPVS_CMD_SET_SERVICE(r5, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xc0820000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="000125bd7000fcdbdf25020000001c0002000800050001010000080002004e240000080004008baf00000800"], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x80) accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000640)={0x0, 0x200, 0x1, 0x5, r4}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000500)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e20, 0x8, @empty, 0x5}], 0x2c) 03:34:17 executing program 2: mkdir(&(0x7f0000000980)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f00000015c0)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000000240)=""/147, 0x1f}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0xf9e1221a8413ff5d, 0x0, &(0x7f0000002e40)={0x77359400}) recvmmsg(0xffffffffffffffff, &(0x7f0000006340)=[{{&(0x7f0000002840)=@l2, 0x80, &(0x7f0000002dc0)=[{&(0x7f00000028c0)=""/220, 0xdc}, {&(0x7f00000029c0)=""/214, 0xd6}], 0x2, &(0x7f0000002d40)=""/47, 0x2f}}], 0x1, 0x0, &(0x7f0000006400)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000400), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) dup(0xffffffffffffffff) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchmod(r1, 0xa) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000000)) 03:34:17 executing program 0: mkdir(&(0x7f0000000980)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f00000015c0)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000000240)=""/147, 0x1f}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0xf9e1221a8413ff5d, 0x0, &(0x7f0000002e40)={0x77359400}) recvmmsg(0xffffffffffffffff, &(0x7f0000006340)=[{{&(0x7f0000002840)=@l2, 0x80, &(0x7f0000002dc0)=[{&(0x7f00000028c0)=""/220, 0xdc}, {&(0x7f00000029c0)=""/214, 0xd6}], 0x2, &(0x7f0000002d40)=""/47, 0x2f}}], 0x1, 0x0, &(0x7f0000006400)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000400), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) dup(0xffffffffffffffff) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchmod(r1, 0xa) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000000)) 03:34:17 executing program 2: mkdir(&(0x7f0000000980)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f00000015c0)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000000240)=""/147, 0x1f}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0xf9e1221a8413ff5d, 0x0, &(0x7f0000002e40)={0x77359400}) recvmmsg(0xffffffffffffffff, &(0x7f0000006340)=[{{&(0x7f0000002840)=@l2, 0x80, &(0x7f0000002dc0)=[{&(0x7f00000028c0)=""/220, 0xdc}, {&(0x7f00000029c0)=""/214, 0xd6}], 0x2, &(0x7f0000002d40)=""/47, 0x2f}}], 0x1, 0x0, &(0x7f0000006400)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000400), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) dup(0xffffffffffffffff) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchmod(r1, 0xa) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000000)) 03:34:17 executing program 0: mkdir(&(0x7f0000000980)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f00000015c0)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000000240)=""/147, 0x1f}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0xf9e1221a8413ff5d, 0x0, &(0x7f0000002e40)={0x77359400}) recvmmsg(0xffffffffffffffff, &(0x7f0000006340)=[{{&(0x7f0000002840)=@l2, 0x80, &(0x7f0000002dc0)=[{&(0x7f00000028c0)=""/220, 0xdc}, {&(0x7f00000029c0)=""/214, 0xd6}], 0x2, &(0x7f0000002d40)=""/47, 0x2f}}], 0x1, 0x0, &(0x7f0000006400)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000400), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) dup(0xffffffffffffffff) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchmod(r1, 0xa) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000000)) 03:34:17 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) accept(0xffffffffffffffff, &(0x7f00000007c0)=@generic, &(0x7f0000000540)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffffb) openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x0, 0x0) add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) socket$nl_route(0x10, 0x3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getpgrp(0x0) sched_setparam(0x0, &(0x7f0000000500)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)={0x0, @rand_addr, @local}, &(0x7f0000000680)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000400)) 03:34:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") seccomp(0x0, 0x0, &(0x7f0000000180)={0x337, &(0x7f0000000140)}) readlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/44, 0x2c) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x0, "5ffaa0237c858ddf75e3937722d61668124687f9283efd9e58d4b7341bc6a3041471ae513be923ca4a75ea79d13d1464fac8be8186b8f1b3792e46830928455b5d2a3c558cb70471aa5c0cf998189d00"}, 0xd8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000003c0)=0x14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000200)={0x77359400}, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000ac0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000c00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000dc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@remote}}}, &(0x7f00000014c0)=0xe8) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in6, @in=@local}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001600)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001640), &(0x7f0000001680)=0xc) getresuid(&(0x7f00000016c0), &(0x7f0000001700), &(0x7f0000001740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002d80)={{{@in6=@local, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000002e80)=0xe8) stat(&(0x7f0000002ec0)='./file0\x00', &(0x7f0000002f00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002f80)) fstat(0xffffffffffffffff, &(0x7f0000002fc0)) getresgid(&(0x7f0000003040), &(0x7f0000003080), &(0x7f00000030c0)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() lstat(&(0x7f0000003100)='./file0/file0\x00', &(0x7f0000003140)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) fstat(0xffffffffffffffff, &(0x7f0000003240)) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003940), &(0x7f0000003980)=0xc) getgid() getpgrp(0xffffffffffffffff) getresuid(&(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)) getgid() getpid() lstat(&(0x7f0000003f40)='./file0\x00', &(0x7f0000003f80)) 03:34:17 executing program 3: seccomp(0x0, 0x0, &(0x7f0000001980)={0x0, &(0x7f0000000580)}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f0000000540)=0x8) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x3f, @local}, 0xffffffffffffffff, 0xffff}}, 0x48) write$binfmt_aout(r3, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1c5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) r5 = socket(0x15, 0x0, 0x0) r6 = getpgrp(0xffffffffffffffff) rt_sigqueueinfo(r6, 0x8, &(0x7f0000000680)={0x3b, 0xe9d2, 0x8, 0x10000}) sendfile(r3, r3, &(0x7f00000000c0), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') tee(r0, r2, 0x100000001, 0x4) sendmsg$IPVS_CMD_SET_SERVICE(r5, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xc0820000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="000125bd7000fcdbdf25020000001c0002000800050001010000080002004e240000080004008baf00000800"], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x80) accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000640)={0x0, 0x200, 0x1, 0x5, r4}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000500)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e20, 0x8, @empty, 0x5}], 0x2c) 03:34:17 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x200008912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80040000000002, &(0x7f00000000c0)=0x65, 0x162) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0xd470041877f0fcc9) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r1, 0x1) 03:34:17 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x200, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept(0xffffffffffffffff, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000180)=0xc) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)) getegid() setresgid(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000007c0)='cubic\x00', 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@loopback}}}, &(0x7f00000001c0)=0xe8) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0x3bd) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000740)={0x0, @loopback, @local}, &(0x7f0000000780)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'team0\x00'}) 03:34:18 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x200008912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80040000000002, &(0x7f00000000c0)=0x65, 0x162) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0xd470041877f0fcc9) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r1, 0x1) 03:34:18 executing program 1: seccomp(0x0, 0x0, &(0x7f0000001980)={0x0, &(0x7f0000000580)}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f0000000540)=0x8) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x3f, @local}, 0xffffffffffffffff, 0xffff}}, 0x48) write$binfmt_aout(r3, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1c5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) r5 = socket(0x15, 0x0, 0x0) r6 = getpgrp(0xffffffffffffffff) rt_sigqueueinfo(r6, 0x8, &(0x7f0000000680)={0x3b, 0xe9d2, 0x8, 0x10000}) sendfile(r3, r3, &(0x7f00000000c0), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') tee(r0, r2, 0x100000001, 0x4) sendmsg$IPVS_CMD_SET_SERVICE(r5, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xc0820000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="000125bd7000fcdbdf25020000001c0002000800050001010000080002004e240000080004008baf00000800"], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x80) accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000640)={0x0, 0x200, 0x1, 0x5, r4}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000500)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e20, 0x8, @empty, 0x5}], 0x2c) 03:34:18 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x200008912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80040000000002, &(0x7f00000000c0)=0x65, 0x162) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0xd470041877f0fcc9) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r1, 0x1) 03:34:18 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x200008912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80040000000002, &(0x7f00000000c0)=0x65, 0x162) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0xd470041877f0fcc9) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r1, 0x1) 03:34:18 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x200009, &(0x7f0000000000)="a899c924ef79f61e384990610decf7166ae8d4c4568900f24c6a0bc9660103e87e003e2e8e2eaa8ca7de7b1a8d2ac0065903547921ffd217497bf9b8711786108f9896c27dad7ef5b47882cd32300c01afce06e992f75264c0da620b4d9b4ee60359c5393f8ee97f218111ea31cb05b62c6e593bfdf9457ef922820548ee727899e24de5255b1e8c571c8837dee1a109d461df9223") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) unlink(&(0x7f0000000500)='./file0/file0\x00') 03:34:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x1ff}) 03:34:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") seccomp(0x0, 0x0, &(0x7f0000000180)={0x337, &(0x7f0000000140)}) readlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/44, 0x2c) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x0, "5ffaa0237c858ddf75e3937722d61668124687f9283efd9e58d4b7341bc6a3041471ae513be923ca4a75ea79d13d1464fac8be8186b8f1b3792e46830928455b5d2a3c558cb70471aa5c0cf998189d00"}, 0xd8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000003c0)=0x14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000200)={0x77359400}, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000ac0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000c00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000dc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@remote}}}, &(0x7f00000014c0)=0xe8) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in6, @in=@local}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001600)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001640), &(0x7f0000001680)=0xc) getresuid(&(0x7f00000016c0), &(0x7f0000001700), &(0x7f0000001740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002d80)={{{@in6=@local, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000002e80)=0xe8) stat(&(0x7f0000002ec0)='./file0\x00', &(0x7f0000002f00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002f80)) fstat(0xffffffffffffffff, &(0x7f0000002fc0)) getresgid(&(0x7f0000003040), &(0x7f0000003080), &(0x7f00000030c0)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() lstat(&(0x7f0000003100)='./file0/file0\x00', &(0x7f0000003140)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) fstat(0xffffffffffffffff, &(0x7f0000003240)) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003940), &(0x7f0000003980)=0xc) getgid() getpgrp(0xffffffffffffffff) getresuid(&(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)) getgid() getpid() lstat(&(0x7f0000003f40)='./file0\x00', &(0x7f0000003f80)) 03:34:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000001980)={0x0, &(0x7f0000000580)}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f0000000540)=0x8) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x3f, @local}, 0xffffffffffffffff, 0xffff}}, 0x48) write$binfmt_aout(r3, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1c5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) r5 = socket(0x15, 0x0, 0x0) r6 = getpgrp(0xffffffffffffffff) rt_sigqueueinfo(r6, 0x8, &(0x7f0000000680)={0x3b, 0xe9d2, 0x8, 0x10000}) sendfile(r3, r3, &(0x7f00000000c0), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') tee(r0, r2, 0x100000001, 0x4) sendmsg$IPVS_CMD_SET_SERVICE(r5, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xc0820000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="000125bd7000fcdbdf25020000001c0002000800050001010000080002004e240000080004008baf00000800"], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x80) accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000640)={0x0, 0x200, 0x1, 0x5, r4}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000500)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e20, 0x8, @empty, 0x5}], 0x2c) [ 1182.110295] FAT-fs (loop1): error, invalid access to FAT (entry 0x000001c4) [ 1182.147065] FAT-fs (loop1): Filesystem has been set read-only 03:34:18 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x200, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept(0xffffffffffffffff, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000180)=0xc) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)) getegid() setresgid(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000007c0)='cubic\x00', 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@loopback}}}, &(0x7f00000001c0)=0xe8) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0x3bd) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000740)={0x0, @loopback, @local}, &(0x7f0000000780)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'team0\x00'}) 03:34:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x1ff}) [ 1182.181651] FAT-fs (loop1): error, invalid access to FAT (entry 0x000001c4) [ 1182.221351] FAT-fs (loop1): error, invalid access to FAT (entry 0x000001c4) [ 1182.294357] FAT-fs (loop1): error, invalid access to FAT (entry 0x000001c4) 03:34:19 executing program 0: clock_getres(0xa, &(0x7f0000000140)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") clock_gettime(0x0, &(0x7f0000000080)) pipe(&(0x7f0000000040)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x1ff}) 03:34:19 executing program 1: seccomp(0x0, 0x0, &(0x7f0000001980)={0x0, &(0x7f0000000580)}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f0000000540)=0x8) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x3f, @local}, 0xffffffffffffffff, 0xffff}}, 0x48) write$binfmt_aout(r3, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1c5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) r5 = socket(0x15, 0x0, 0x0) r6 = getpgrp(0xffffffffffffffff) rt_sigqueueinfo(r6, 0x8, &(0x7f0000000680)={0x3b, 0xe9d2, 0x8, 0x10000}) sendfile(r3, r3, &(0x7f00000000c0), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') tee(r0, r2, 0x100000001, 0x4) sendmsg$IPVS_CMD_SET_SERVICE(r5, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xc0820000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="000125bd7000fcdbdf25020000001c0002000800050001010000080002004e240000080004008baf00000800"], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x80) accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000640)={0x0, 0x200, 0x1, 0x5, r4}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000500)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e20, 0x8, @empty, 0x5}], 0x2c) 03:34:19 executing program 0: clock_getres(0xa, &(0x7f0000000140)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") clock_gettime(0x0, &(0x7f0000000080)) pipe(&(0x7f0000000040)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x1ff}) 03:34:19 executing program 5: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) 03:34:19 executing program 0: clock_getres(0xa, &(0x7f0000000140)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") clock_gettime(0x0, &(0x7f0000000080)) pipe(&(0x7f0000000040)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") seccomp(0x0, 0x0, &(0x7f0000000180)={0x337, &(0x7f0000000140)}) readlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/44, 0x2c) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x0, "5ffaa0237c858ddf75e3937722d61668124687f9283efd9e58d4b7341bc6a3041471ae513be923ca4a75ea79d13d1464fac8be8186b8f1b3792e46830928455b5d2a3c558cb70471aa5c0cf998189d00"}, 0xd8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000003c0)=0x14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000200)={0x77359400}, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000ac0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000c00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000dc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@remote}}}, &(0x7f00000014c0)=0xe8) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in6, @in=@local}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001600)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001640), &(0x7f0000001680)=0xc) getresuid(&(0x7f00000016c0), &(0x7f0000001700), &(0x7f0000001740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002d80)={{{@in6=@local, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000002e80)=0xe8) stat(&(0x7f0000002ec0)='./file0\x00', &(0x7f0000002f00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002f80)) fstat(0xffffffffffffffff, &(0x7f0000002fc0)) getresgid(&(0x7f0000003040), &(0x7f0000003080), &(0x7f00000030c0)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() lstat(&(0x7f0000003100)='./file0/file0\x00', &(0x7f0000003140)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) fstat(0xffffffffffffffff, &(0x7f0000003240)) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003940), &(0x7f0000003980)=0xc) getgid() getpgrp(0xffffffffffffffff) getresuid(&(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)) getgid() getpid() lstat(&(0x7f0000003f40)='./file0\x00', &(0x7f0000003f80)) 03:34:19 executing program 0: clock_getres(0xa, &(0x7f0000000140)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") clock_gettime(0x0, &(0x7f0000000080)) pipe(&(0x7f0000000040)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:20 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x200, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept(0xffffffffffffffff, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000180)=0xc) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)) getegid() setresgid(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000007c0)='cubic\x00', 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@loopback}}}, &(0x7f00000001c0)=0xe8) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0x3bd) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000740)={0x0, @loopback, @local}, &(0x7f0000000780)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'team0\x00'}) [ 1183.309871] FAT-fs (loop1): error, invalid access to FAT (entry 0x000001c4) [ 1183.328093] FAT-fs (loop1): Filesystem has been set read-only 03:34:20 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000008061f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) [ 1183.352316] FAT-fs (loop1): error, invalid access to FAT (entry 0x000001c4) 03:34:20 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001180)=ANY=[], &(0x7f0000000f00)) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) creat(&(0x7f0000000cc0)='./file0\x00', 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000d00)=""/158, &(0x7f0000000dc0)=0x9e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000f40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) getuid() getresuid(&(0x7f0000000300), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x17, &(0x7f0000000880)=""/23, 0x12, &(0x7f0000000940)=""/18, 0x52, &(0x7f0000000980)=""/82}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getuid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 1183.409955] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 1183.428739] FAT-fs (loop1): error, invalid access to FAT (entry 0x000001c4) [ 1183.456539] nla_parse: 10 callbacks suppressed [ 1183.456549] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1183.481535] FAT-fs (loop1): error, invalid access to FAT (entry 0x000001c4) 03:34:20 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000008061f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 03:34:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[], 0x123}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090e000000001300000001000005000600000000000a000000000000000000e90000ebffffff00000000000000000b0000000000000200010000000000000000020000002005000500000000000a0000f2fffffffffee8001f0002000000000000000000170000000000000000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000004, 0x0) [ 1183.578341] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 1183.597560] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 03:34:20 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000008061f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 03:34:20 executing program 5: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) [ 1183.766789] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 1183.793056] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 03:34:20 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000008061f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 03:34:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[], 0x123}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090e000000001300000001000005000600000000000a000000000000000000e90000ebffffff00000000000000000b0000000000000200010000000000000000020000002005000500000000000a0000f2fffffffffee8001f0002000000000000000000170000000000000000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000004, 0x0) 03:34:20 executing program 4: keyctl$set_reqkey_keyring(0x2, 0xfffffffb) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() [ 1183.994013] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 1184.036421] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 03:34:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[], 0x123}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090e000000001300000001000005000600000000000a000000000000000000e90000ebffffff00000000000000000b0000000000000200010000000000000000020000002005000500000000000a0000f2fffffffffee8001f0002000000000000000000170000000000000000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000004, 0x0) 03:34:20 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x200, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept(0xffffffffffffffff, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000180)=0xc) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)) getegid() setresgid(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000007c0)='cubic\x00', 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@loopback}}}, &(0x7f00000001c0)=0xe8) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0x3bd) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000740)={0x0, @loopback, @local}, &(0x7f0000000780)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'team0\x00'}) 03:34:20 executing program 3: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() creat(&(0x7f0000000b40)='./file0\x00', 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000b80)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) fstat(0xffffffffffffffff, &(0x7f0000000800)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={0xffffffffffffffff}, 0x10) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000b00)) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/udp\x00') getuid() connect$netlink(0xffffffffffffffff, &(0x7f00000001c0)=@unspec, 0xc) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @local}}}, 0x108) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x0) syz_execute_func(&(0x7f00000004c0)="42805da0bd0fef69dc0f01eece738c19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a2664af4472e671fb0703") getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) 03:34:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[], 0x123}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090e000000001300000001000005000600000000000a000000000000000000e90000ebffffff00000000000000000b0000000000000200010000000000000000020000002005000500000000000a0000f2fffffffffee8001f0002000000000000000000170000000000000000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000004, 0x0) 03:34:21 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001180)=ANY=[], &(0x7f0000000f00)) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) creat(&(0x7f0000000cc0)='./file0\x00', 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000d00)=""/158, &(0x7f0000000dc0)=0x9e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000f40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) getuid() getresuid(&(0x7f0000000300), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x17, &(0x7f0000000880)=""/23, 0x12, &(0x7f0000000940)=""/18, 0x52, &(0x7f0000000980)=""/82}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getuid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:21 executing program 1: getrlimit(0x0, &(0x7f0000000280)) clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0876969ef69dc00d9f0008f00008020c421da7fb43232233333183737660f3838d8c4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a140008000011f0802403088e9fa3c4033d5c160e4b") 03:34:21 executing program 5: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) 03:34:21 executing program 4: keyctl$set_reqkey_keyring(0x2, 0xfffffffb) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() 03:34:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x1, 0x1b0, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000040), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'rose0\x00', 'eql\x00', 'syzkaller0\x00', 'ifb0\x00', @dev, [], @empty, [], 0xf0, 0xf0, 0x120, [@devgroup={'devgroup\x00', 0x18, {{0x3}}}, @devgroup={'devgroup\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x228) 03:34:21 executing program 3: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() creat(&(0x7f0000000b40)='./file0\x00', 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000b80)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) fstat(0xffffffffffffffff, &(0x7f0000000800)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={0xffffffffffffffff}, 0x10) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000b00)) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/udp\x00') getuid() connect$netlink(0xffffffffffffffff, &(0x7f00000001c0)=@unspec, 0xc) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @local}}}, 0x108) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x0) syz_execute_func(&(0x7f00000004c0)="42805da0bd0fef69dc0f01eece738c19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a2664af4472e671fb0703") getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) 03:34:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x1, 0x1b0, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000040), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'rose0\x00', 'eql\x00', 'syzkaller0\x00', 'ifb0\x00', @dev, [], @empty, [], 0xf0, 0xf0, 0x120, [@devgroup={'devgroup\x00', 0x18, {{0x3}}}, @devgroup={'devgroup\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x228) 03:34:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x1, 0x1b0, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000040), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'rose0\x00', 'eql\x00', 'syzkaller0\x00', 'ifb0\x00', @dev, [], @empty, [], 0xf0, 0xf0, 0x120, [@devgroup={'devgroup\x00', 0x18, {{0x3}}}, @devgroup={'devgroup\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x228) 03:34:22 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001180)=ANY=[], &(0x7f0000000f00)) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) creat(&(0x7f0000000cc0)='./file0\x00', 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000d00)=""/158, &(0x7f0000000dc0)=0x9e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000f40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) getuid() getresuid(&(0x7f0000000300), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x17, &(0x7f0000000880)=""/23, 0x12, &(0x7f0000000940)=""/18, 0x52, &(0x7f0000000980)=""/82}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getuid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:22 executing program 1: getrlimit(0x0, &(0x7f0000000280)) clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0876969ef69dc00d9f0008f00008020c421da7fb43232233333183737660f3838d8c4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a140008000011f0802403088e9fa3c4033d5c160e4b") 03:34:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x1, 0x1b0, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000040), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'rose0\x00', 'eql\x00', 'syzkaller0\x00', 'ifb0\x00', @dev, [], @empty, [], 0xf0, 0xf0, 0x120, [@devgroup={'devgroup\x00', 0x18, {{0x3}}}, @devgroup={'devgroup\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x228) 03:34:22 executing program 5: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) 03:34:22 executing program 2: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:22 executing program 2: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:22 executing program 4: keyctl$set_reqkey_keyring(0x2, 0xfffffffb) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() 03:34:22 executing program 3: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() creat(&(0x7f0000000b40)='./file0\x00', 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000b80)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) fstat(0xffffffffffffffff, &(0x7f0000000800)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={0xffffffffffffffff}, 0x10) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000b00)) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/udp\x00') getuid() connect$netlink(0xffffffffffffffff, &(0x7f00000001c0)=@unspec, 0xc) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @local}}}, 0x108) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x0) syz_execute_func(&(0x7f00000004c0)="42805da0bd0fef69dc0f01eece738c19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a2664af4472e671fb0703") getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) 03:34:23 executing program 2: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:23 executing program 1: getrlimit(0x0, &(0x7f0000000280)) clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0876969ef69dc00d9f0008f00008020c421da7fb43232233333183737660f3838d8c4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a140008000011f0802403088e9fa3c4033d5c160e4b") 03:34:23 executing program 5: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getgroups(0x0, &(0x7f0000000800)) setxattr$trusted_overlay_origin(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='trusted.overlay.origin\x00', &(0x7f0000000cc0)='y\x00', 0x2, 0x0) 03:34:23 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001180)=ANY=[], &(0x7f0000000f00)) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) creat(&(0x7f0000000cc0)='./file0\x00', 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000d00)=""/158, &(0x7f0000000dc0)=0x9e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000f40)=""/182) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000b00)) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) getuid() getresuid(&(0x7f0000000300), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x17, &(0x7f0000000880)=""/23, 0x12, &(0x7f0000000940)=""/18, 0x52, &(0x7f0000000980)=""/82}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getuid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:23 executing program 2: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:23 executing program 4: keyctl$set_reqkey_keyring(0x2, 0xfffffffb) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() 03:34:23 executing program 3: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() creat(&(0x7f0000000b40)='./file0\x00', 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000b80)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) fstat(0xffffffffffffffff, &(0x7f0000000800)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={0xffffffffffffffff}, 0x10) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000b00)) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/udp\x00') getuid() connect$netlink(0xffffffffffffffff, &(0x7f00000001c0)=@unspec, 0xc) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @local}}}, 0x108) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x0) syz_execute_func(&(0x7f00000004c0)="42805da0bd0fef69dc0f01eece738c19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a2664af4472e671fb0703") getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) 03:34:23 executing program 2: prctl$setname(0x1d, &(0x7f0000000380)='/dev/midi#\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") 03:34:24 executing program 1: getrlimit(0x0, &(0x7f0000000280)) clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0876969ef69dc00d9f0008f00008020c421da7fb43232233333183737660f3838d8c4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a140008000011f0802403088e9fa3c4033d5c160e4b") 03:34:24 executing program 0: clock_gettime(0x9, &(0x7f0000000180)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000140), 0x0) socket$pppoe(0x18, 0x1, 0x0) geteuid() getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000500)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000c40), &(0x7f0000000680), &(0x7f0000000c80)) getegid() getegid() lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000b40)=ANY=[], 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffff9c) syz_execute_func(&(0x7f0000000080)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") clock_gettime(0x0, &(0x7f00000006c0)) 03:34:24 executing program 5: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getgroups(0x0, &(0x7f0000000800)) setxattr$trusted_overlay_origin(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='trusted.overlay.origin\x00', &(0x7f0000000cc0)='y\x00', 0x2, 0x0) 03:34:24 executing program 4: pipe2(&(0x7f0000001300), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='/proc/self/net/pfkey\x00'}, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000280), &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000300), 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') socket$inet_tcp(0x2, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) geteuid() getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0), &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000002c0), 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={"626f6e645f736c6176655f30000e00", {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$inet(0xffffffffffffffff, &(0x7f0000dc9ff0)={0x2, 0x0, @rand_addr}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f00000012c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)) chdir(&(0x7f0000001340)='./bus\x00') syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000200)) creat(&(0x7f0000000100)='./bus\x00', 0x0) 03:34:24 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000240)=@getae={0x40, 0x1f, 0x0, 0x0, 0x0, {{@in6=@dev}, @in=@multicast2}}, 0x40}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000006c0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @local}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000480)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[], 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000700)) io_setup(0x0, &(0x7f0000000600)) pipe(&(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:24 executing program 2: prctl$setname(0x1d, &(0x7f0000000380)='/dev/midi#\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") 03:34:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) write$UHID_INPUT(r2, &(0x7f00000006c0)={0x8, "8a86178fa586f8d7213aa6f466b75fbd67c374b74de1e88fe8c72c7fba4798e26decc37ff822c391800352d9d7d7158d1b50980d28c7851cebb41adce735a45ffa614ff0399040d8132bf9d8f365b410d43b39d9afe87b7788320844586cf499cbfda2bc1f20243743a806e0ab4eb95aecf9eda5e4cc0862f25347e5393259c2349be172c9887a852a836de14d083cfbe9e1f18b2f85f317bfd0a5f09118a76b138f87334ed4cf8a6ab01aa191e987be4326b30b7705e16f2301f8351f2eac77eb423a640333b176ea1f57829b092d3e4a6db85313996ceab8323a5689345569cc675a4242395f0892b84deb3f4343d6ac0d86892a0805b28620f8fcc0a136a21cf0a97a74496eb7de14302566ae981d29152abb0a4a12b14d4ae46aa877c26c4391e9098c3ce73092730a11721cee318deec061a94603b04511eb85b5a67c4a49a38fc09d0955e760c6708f8e30967a6729c1b72f2cce270cf4c466e9d688e11e411f2405e036fb9b4e8c8c7b8c83dec3f60f7392715300a57287d59c0f0833a6fc56eb92282b10c9e206b4b0f981bc47a54877c8b16883b50c0662a599806d8ad4cde76d2b44e2050b6d0d96824b7f2359aa054e437b16e6120d62581ca77504474bb7168b1e801e163cb4b3b549496a5c2c4d47ee7ff461078d556deaf8c5b57c43607198d873d8af529642fc92432da63e22556276b880e72a3a5ee5325bdba25b1c59b7a8cf90565eadca736853c7b2ceb789517a119e0be9a6d199e7a56613d51df6642e3a4bfc49a99fe81b36442bea81da216a8f51086cf4dffb87ab33084b8da84eccc6950ea733358ac25c3456a19be352de31b4ed4776897a8321007fb9663e2804f061b3e82b1e4893efa492f96d05ee6f1ec2c8ce46d4146ff0ca867607965502d404f84b5eadb19c23843e0a7fb2184416c4e3bfeeea54597b1e96968108088a7caeaee4fac75aa955a9c4ae7cd0e9a3cc140d50c57a8a1c167dc516c926737abebeedf2b8b11177936ff1ed2f831eee10d465fb75e70d787de54ccff6d6c273aa77cee9da5daae5e1a6a70872e564b097447e9fe4aeea67a5d2b5d98cf725ece1699b88bc24e6a376818faed2213a26ccd1888c7edb77eb54960217d2ea3bc76430f58d85affed832131e67e9b7624ee76d8553d3def452e89d9f6d2cba3a2afc489ef3ac3823d133b9ba917696ae0053e68d0a68d56b2ddf4dddd016e5510abc46e413ae242198ac362b3ac4b151d9513b461d91a2e1b4d6818e9b85a9ed1f0292ccd94063c246fcde8be7204d990648e5ef7d010429fbe6c613ffa7880700a5dc35724e1e80cfc1a5df4ec6aed73096707215cdd04f3bc797c9e8b45d06e43e1ba19acb52fd69df0d8c39a83a7973203146c28fc8b9451d90c6dd7f57af2eb7f3db1aac6f68c9bf232dc497a83e4529b67e308f73de176fb6738e769d2946b5a3b18b3566f9698bff7cba27d0723bd3f376fee0d8cb5ca8bdcc46c45e40bb44e20d3d403324c056b1c24f5fc16a2f286cbe4afa6fa8c38eae567ed8828fd62796c01c95cf7038808edcc1c38f31f2aae372d951916b7eadd615d6ea2d3e7d90aa453bd5db3ebff5911b945a676063a9c8308be4470cc7fec00c493128e08c254e85f0bc7abe17f9016b0f75a7137c700afec1b93bea6d79042a19906e1a609c568d23b38bc785303c68afe2fa6739b49224abfcc8a1a1d0405f468deeb3c79249599d3416633fe05a9136eea2cd25a707e9e76edfc1ee34668493cffe3c4d78197ca4704065ddc95c9b458f989cc5f39ab3c90500c9e4e756baafcca032bbf3d79b78f7ea1c33c13465f05f5f41f65bc3f37705c08210e6501646e09a4a31fac0e62faff24f5fcb9aaafccae34c5090aade82244daca2a5a280b926213414a7f65698a8a4558a6a35b6c9643c32271ba535a4cb7f37160a356769b9e87c125c466b2efe3735e2ff3c85e8f725540a4e1937c3164dc69256f7a9ee7e952ec5939f55b63be3203eda1d27f6009477c7f9aba258ceb1cca6b5986f98cab0d110c40ffeabfadc0d1e273395a1af3f6f6d472961f5f81fb9a6d20d0d7e953405248099a6d2d01d604ed8fc7b23f7dfc80403d866ea4015cb3ac06ff516e0dcc1cfb873e02a4a3025bdcdc04ea4e06905843267967ea9993c4ba4dd5b43ce979841a2280d01e885cf8a8ac7a5805da4d0c82c66ed69494725e4cb8a1c194d65437f11fc5dbfc90329621e7289bf805a0e6b63408375f769386cf091772a54791204446bc58af28d176cc6d366186164665dcb2627e50b86bcc540ddc32c678d83e7cacc306b0ac5e9c21687f08f392c244f05d3444c06c993dda0cc83494637e099ec5b5677f73b0d1c43194708afe8c5573152ea5025e3a7aeec319cff78906a9e5dbac737283fe94c34915a3327fba27cf337e8503c665abaf53c0a7fcfedbc00188c6537d136deae38eea167e5f598aeedb0258b1adce55f0ee545ac4cd86bed5388c92364fe2dc43c2c7f6bbef35832dab7359a66359e9fc2f8d9de13fac9a1dbbf8a4a09711f6c880c8d3e3e36d14dd4c7d309c98a27a0cbea0e336f106c63128504227fad86063e5cc10bbb1a8bea86fbe4cc9e8bf15ec8a30559bdbda78684e0e5f3b65d4601c98cd706c3f13f059ff735ca8abb72ffc3808233b993205a35669f1fcf28ba7df9a5cd228ca883deaabd43362b8dd5cf122ccdd12a845e1f0feb03f43f55295f774bc94d2d93887044cbde7bc5a4deb3bfc4d26d29e4fd6d4e88ea92f47b6d11e3a3fa003baab78544935e92b76055f4829cfa131ca30dffc25f65e68872485af67a2401a423f80b1950507c8498c835a5e1dd1ffd14ba2b4d4266606f3a1abf7c35db4640c39f6598f5e197d531a5e25dacc4491b8f041d41d86230767354c6d35899881d826810cb3cb58269c318f279958a2273435a51e77b99a4272ad9009c460d061237156f3b797044374ae847753473a1e77dea435e67262ffdc449be1e1647e6c2c242daee1b5e8f8df2a8ebdf24cfa59e5c32e22dadf91e505a46fcc76801dfd78a5b4cc023cfe866f50d850716be1b88cf2795db087c0d3a55eff4429ceb4e2b39efc15f9360fa5e77c21af1ef751dc73f97cddc0955d008dd10a58626dc33d29042c893756ef618b140aeefa7d0618ebf92815275fe6957a0226c7c732c343f40f213d307ab6bb01c50e82779c46b3985bce56770c747b791b40c4eede98d08c36cec7e37938c4316e907f0193553d6ab62fc1f602d0ad6bf7eda74b7e0eb45be0bf75529299f96d12d4902ddd76876da82819c307386b8487150e11bfd70170bf247010c06b4800d8ae8e5e1f35ade7e2569f8059cd443650f2474f4a0319540afc4fa94018c659b640bb7f7f55ae18b641d9a79656701ac5f31f76c630ddb6faa07a901b7c2a878fa11e6d59c71f043ed6ed1c5454f96edfc4be2c8227a3514baae90c0d41b982cb3b79748f5a90cd3c074a145861658a5798ba6c9f5390e074437c411d4e08c7addd326085996c6f2ea772f33943d1ed32e3a54bcca5c09119d3c3f96ab2af62d7035984a4457b99d5f02ffd6fbebc1da7cc733f0c7f1fec2f601b046eb8dec964474d0205a13710630ba7468ca8807b028cdaaeb1970fd8d31a68f7ef3e56a2cb300766fcbfc8f53bece56ba10b211df2c24c427df7c8b6ee69cd1edacf71e817d1732be3bfb85d1373f8a686c76ef9bcc071ec028341e7de4be5fd99c7206e9476cd1383ebbc1995ef09d5cc478ffb9623763507f12dd4a9b2f5a4ffbcf2a199fd9c7828ed65136c0918343a5dfed82789658f4dcaea806b229e7420a7d9a7e357280556a09f720571916b7efd1e0e2ebd1cedf2fb86c4eadae8fffd51309009058b0756e939541e972e4be30253bd277a43c27e83020223eab9bff1cfb332c59365113d8532c31a77945bba3e680e522b2d284997090a95ebf955fd05a6284f46db6a90d8f30968fd30a0517f46bfc3bcb9aad542da3b3cec430e25ee339485f17747b4ca72f900f831b8de74a858c982f73a3a30b3d816691d50226c1ce61c7549e8892180248544d0d99346489d38dcb041c4c43bef1beb5771df4af8cd8a3bd205314ffe08079041e8ce4733184c3bc24b124837acd90b31ac6fc5a4a2d0364143bb8f6ed60cb3860cdd5b4179c6a80f4c5f3a6e1437ec29d89f726ec776a5e784c4eba2dce6fab2e83174ee2a9a2a9672087ff4aa7e452ad1843546d44eda2c8c33a1043d06b4727f567d6c0693287c514834a033f4893739b80d99d35e45e7ad899d8740d901071e04eb2e930783bfe738d0e67e6df383919d73c12339dbafbc72da544511d00051c7629ffdc109b37ace21c9675cd54e5dfe6a36e48cf62d3f3431a1f8e2bfdf8c4207db66783b3d33fd755b9cdcc4e19c7b8dd78f6c2317ab8fa5da99c846567d1eee89b4a29fb44667991daf9490494f82721fbce475dec5f2fbd4aefac331d41a6fc60b4a54ea939c4128c1127098211714ea0e4843a2befadb4d6389be76e2a790d397752c78bf3b84465d3fc9c250cc5f43695b49c3f2fc078781983092b0a00e6c2b87e881fa1806c38118cce85cbf61d372a1574e2a5dc4898a99781ae7191430ecf7b51f248d5175adf00c69723c592ef6042f90954ead480c4d1cbd6197a6e5b16cc3c52578642df273677527b5ee8301ea2f891687d852ebefff6ef29eab71efd056b992a809af4f100adffda3080298f35c010a540785d80e7b21215052175e6ed0c8abb24633d5e39c7fd14c054a90f9ed4c6ac9203866047110abdad38c39ba994b613298b06085c1ac5382b506c90b8e0a452f5aa2769cc540aabed921d3699e10b408cd37118b3dc157c24df45c0cb1ac9f5e1f4a29c9542976a5cf7db3914f8ddcffbea353dca70ea94ec476f01cbf04f1d0cbb8db92109355a714ec7c361b9b88b737f6a36cefa2620b98cbe65769fdc33a061edb215ab5b693f27a1fae63a2507295615295cb148abccdb711133908dab3ec377251760936cd8dc2e59e037befcfacc17ff876e55cd3f66e6c6744589a112b3104ed265fb6ac94092d3c709181868c82c1211ad0e327e57fb0c9fce2ed43ac36a603928a366b0f1e95b16fad594ef43b8a6135b4e93eea2565a4468e423949871cd6faaa74bc6a984214b9c4854bafaea6698802be1fac06c6055a45ce4b86ddc230862363c612a2c7c2bf08c876f8c20f5beb134f04e5cdbed996dd54e5bac619d16aba136f9db47c8739f5aa04b9bc16feaaf0a4f47d5ee9e6a8eb1d72ca487baa33141d87d879298fc1057c9aee7b4d6beb5025c7b6c1d0e214d18e749bd6e1669ec3ccc1c1a4164b31fd9a0452d7214bb97bccdb8df0b2634122ad3bb008fb011cbdcc1b80653c3d8bf8346efa39674c23d6d59610e72e2f520667e7572e59a08b27855b4011f644f94e70a0e4ac59d1d5730f187016aa847aaaff4610071c494c01f9f768c27765e911704eb95a26b26d04b68f8a0512c55204ebf6870088972ea74c9014ab9239696bf6b6573c0a845c2260634f7c8261adc05c5d9e8b9ea5c87a9169919bd72cceecedc7eac5fdcd0073c67bd8bb9613d3c95cd00cc0d07a8d0c73911c442c8f92329f9b2980a9b6413c0618aa3ebe59d3a4beca3d2fb0881f56db7880b70973220a1da6232ace4d468696c29e9184b79a1634d74d651812bc861f0ef99a3b6f02c8ea4babad622f37f6861ac62da0d7f7c15ba94e7c90757520119c59419201f12e125bef13d5921fc60c80928081fb428dd", 0x1000}, 0x1006) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) close(r2) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)) 03:34:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) write$UHID_INPUT(r2, &(0x7f00000006c0)={0x8, "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", 0x1000}, 0x1006) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) close(r2) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)) 03:34:25 executing program 5: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getgroups(0x0, &(0x7f0000000800)) setxattr$trusted_overlay_origin(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='trusted.overlay.origin\x00', &(0x7f0000000cc0)='y\x00', 0x2, 0x0) 03:34:25 executing program 0: clock_gettime(0x9, &(0x7f0000000180)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000140), 0x0) socket$pppoe(0x18, 0x1, 0x0) geteuid() getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000500)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000c40), &(0x7f0000000680), &(0x7f0000000c80)) getegid() getegid() lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000b40)=ANY=[], 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffff9c) syz_execute_func(&(0x7f0000000080)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") clock_gettime(0x0, &(0x7f00000006c0)) 03:34:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) write$UHID_INPUT(r2, &(0x7f00000006c0)={0x8, "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", 0x1000}, 0x1006) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) close(r2) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)) 03:34:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) write$UHID_INPUT(r2, &(0x7f00000006c0)={0x8, "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", 0x1000}, 0x1006) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) close(r2) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)) 03:34:25 executing program 4: pipe2(&(0x7f0000001300), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='/proc/self/net/pfkey\x00'}, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000280), &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000300), 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') socket$inet_tcp(0x2, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) geteuid() getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0), &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000002c0), 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={"626f6e645f736c6176655f30000e00", {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$inet(0xffffffffffffffff, &(0x7f0000dc9ff0)={0x2, 0x0, @rand_addr}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f00000012c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)) chdir(&(0x7f0000001340)='./bus\x00') syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000200)) creat(&(0x7f0000000100)='./bus\x00', 0x0) 03:34:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) write$UHID_INPUT(r2, &(0x7f00000006c0)={0x8, "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", 0x1000}, 0x1006) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) close(r2) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)) 03:34:25 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000240)=@getae={0x40, 0x1f, 0x0, 0x0, 0x0, {{@in6=@dev}, @in=@multicast2}}, 0x40}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000006c0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @local}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000480)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[], 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000700)) io_setup(0x0, &(0x7f0000000600)) pipe(&(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:25 executing program 2: prctl$setname(0x1d, &(0x7f0000000380)='/dev/midi#\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") 03:34:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) write$UHID_INPUT(r2, &(0x7f00000006c0)={0x8, "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", 0x1000}, 0x1006) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) close(r2) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)) 03:34:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) write$UHID_INPUT(r2, &(0x7f00000006c0)={0x8, "8a86178fa586f8d7213aa6f466b75fbd67c374b74de1e88fe8c72c7fba4798e26decc37ff822c391800352d9d7d7158d1b50980d28c7851cebb41adce735a45ffa614ff0399040d8132bf9d8f365b410d43b39d9afe87b7788320844586cf499cbfda2bc1f20243743a806e0ab4eb95aecf9eda5e4cc0862f25347e5393259c2349be172c9887a852a836de14d083cfbe9e1f18b2f85f317bfd0a5f09118a76b138f87334ed4cf8a6ab01aa191e987be4326b30b7705e16f2301f8351f2eac77eb423a640333b176ea1f57829b092d3e4a6db85313996ceab8323a5689345569cc675a4242395f0892b84deb3f4343d6ac0d86892a0805b28620f8fcc0a136a21cf0a97a74496eb7de14302566ae981d29152abb0a4a12b14d4ae46aa877c26c4391e9098c3ce73092730a11721cee318deec061a94603b04511eb85b5a67c4a49a38fc09d0955e760c6708f8e30967a6729c1b72f2cce270cf4c466e9d688e11e411f2405e036fb9b4e8c8c7b8c83dec3f60f7392715300a57287d59c0f0833a6fc56eb92282b10c9e206b4b0f981bc47a54877c8b16883b50c0662a599806d8ad4cde76d2b44e2050b6d0d96824b7f2359aa054e437b16e6120d62581ca77504474bb7168b1e801e163cb4b3b549496a5c2c4d47ee7ff461078d556deaf8c5b57c43607198d873d8af529642fc92432da63e22556276b880e72a3a5ee5325bdba25b1c59b7a8cf90565eadca736853c7b2ceb789517a119e0be9a6d199e7a56613d51df6642e3a4bfc49a99fe81b36442bea81da216a8f51086cf4dffb87ab33084b8da84eccc6950ea733358ac25c3456a19be352de31b4ed4776897a8321007fb9663e2804f061b3e82b1e4893efa492f96d05ee6f1ec2c8ce46d4146ff0ca867607965502d404f84b5eadb19c23843e0a7fb2184416c4e3bfeeea54597b1e96968108088a7caeaee4fac75aa955a9c4ae7cd0e9a3cc140d50c57a8a1c167dc516c926737abebeedf2b8b11177936ff1ed2f831eee10d465fb75e70d787de54ccff6d6c273aa77cee9da5daae5e1a6a70872e564b097447e9fe4aeea67a5d2b5d98cf725ece1699b88bc24e6a376818faed2213a26ccd1888c7edb77eb54960217d2ea3bc76430f58d85affed832131e67e9b7624ee76d8553d3def452e89d9f6d2cba3a2afc489ef3ac3823d133b9ba917696ae0053e68d0a68d56b2ddf4dddd016e5510abc46e413ae242198ac362b3ac4b151d9513b461d91a2e1b4d6818e9b85a9ed1f0292ccd94063c246fcde8be7204d990648e5ef7d010429fbe6c613ffa7880700a5dc35724e1e80cfc1a5df4ec6aed73096707215cdd04f3bc797c9e8b45d06e43e1ba19acb52fd69df0d8c39a83a7973203146c28fc8b9451d90c6dd7f57af2eb7f3db1aac6f68c9bf232dc497a83e4529b67e308f73de176fb6738e769d2946b5a3b18b3566f9698bff7cba27d0723bd3f376fee0d8cb5ca8bdcc46c45e40bb44e20d3d403324c056b1c24f5fc16a2f286cbe4afa6fa8c38eae567ed8828fd62796c01c95cf7038808edcc1c38f31f2aae372d951916b7eadd615d6ea2d3e7d90aa453bd5db3ebff5911b945a676063a9c8308be4470cc7fec00c493128e08c254e85f0bc7abe17f9016b0f75a7137c700afec1b93bea6d79042a19906e1a609c568d23b38bc785303c68afe2fa6739b49224abfcc8a1a1d0405f468deeb3c79249599d3416633fe05a9136eea2cd25a707e9e76edfc1ee34668493cffe3c4d78197ca4704065ddc95c9b458f989cc5f39ab3c90500c9e4e756baafcca032bbf3d79b78f7ea1c33c13465f05f5f41f65bc3f37705c08210e6501646e09a4a31fac0e62faff24f5fcb9aaafccae34c5090aade82244daca2a5a280b926213414a7f65698a8a4558a6a35b6c9643c32271ba535a4cb7f37160a356769b9e87c125c466b2efe3735e2ff3c85e8f725540a4e1937c3164dc69256f7a9ee7e952ec5939f55b63be3203eda1d27f6009477c7f9aba258ceb1cca6b5986f98cab0d110c40ffeabfadc0d1e273395a1af3f6f6d472961f5f81fb9a6d20d0d7e953405248099a6d2d01d604ed8fc7b23f7dfc80403d866ea4015cb3ac06ff516e0dcc1cfb873e02a4a3025bdcdc04ea4e06905843267967ea9993c4ba4dd5b43ce979841a2280d01e885cf8a8ac7a5805da4d0c82c66ed69494725e4cb8a1c194d65437f11fc5dbfc90329621e7289bf805a0e6b63408375f769386cf091772a54791204446bc58af28d176cc6d366186164665dcb2627e50b86bcc540ddc32c678d83e7cacc306b0ac5e9c21687f08f392c244f05d3444c06c993dda0cc83494637e099ec5b5677f73b0d1c43194708afe8c5573152ea5025e3a7aeec319cff78906a9e5dbac737283fe94c34915a3327fba27cf337e8503c665abaf53c0a7fcfedbc00188c6537d136deae38eea167e5f598aeedb0258b1adce55f0ee545ac4cd86bed5388c92364fe2dc43c2c7f6bbef35832dab7359a66359e9fc2f8d9de13fac9a1dbbf8a4a09711f6c880c8d3e3e36d14dd4c7d309c98a27a0cbea0e336f106c63128504227fad86063e5cc10bbb1a8bea86fbe4cc9e8bf15ec8a30559bdbda78684e0e5f3b65d4601c98cd706c3f13f059ff735ca8abb72ffc3808233b993205a35669f1fcf28ba7df9a5cd228ca883deaabd43362b8dd5cf122ccdd12a845e1f0feb03f43f55295f774bc94d2d93887044cbde7bc5a4deb3bfc4d26d29e4fd6d4e88ea92f47b6d11e3a3fa003baab78544935e92b76055f4829cfa131ca30dffc25f65e68872485af67a2401a423f80b1950507c8498c835a5e1dd1ffd14ba2b4d4266606f3a1abf7c35db4640c39f6598f5e197d531a5e25dacc4491b8f041d41d86230767354c6d35899881d826810cb3cb58269c318f279958a2273435a51e77b99a4272ad9009c460d061237156f3b797044374ae847753473a1e77dea435e67262ffdc449be1e1647e6c2c242daee1b5e8f8df2a8ebdf24cfa59e5c32e22dadf91e505a46fcc76801dfd78a5b4cc023cfe866f50d850716be1b88cf2795db087c0d3a55eff4429ceb4e2b39efc15f9360fa5e77c21af1ef751dc73f97cddc0955d008dd10a58626dc33d29042c893756ef618b140aeefa7d0618ebf92815275fe6957a0226c7c732c343f40f213d307ab6bb01c50e82779c46b3985bce56770c747b791b40c4eede98d08c36cec7e37938c4316e907f0193553d6ab62fc1f602d0ad6bf7eda74b7e0eb45be0bf75529299f96d12d4902ddd76876da82819c307386b8487150e11bfd70170bf247010c06b4800d8ae8e5e1f35ade7e2569f8059cd443650f2474f4a0319540afc4fa94018c659b640bb7f7f55ae18b641d9a79656701ac5f31f76c630ddb6faa07a901b7c2a878fa11e6d59c71f043ed6ed1c5454f96edfc4be2c8227a3514baae90c0d41b982cb3b79748f5a90cd3c074a145861658a5798ba6c9f5390e074437c411d4e08c7addd326085996c6f2ea772f33943d1ed32e3a54bcca5c09119d3c3f96ab2af62d7035984a4457b99d5f02ffd6fbebc1da7cc733f0c7f1fec2f601b046eb8dec964474d0205a13710630ba7468ca8807b028cdaaeb1970fd8d31a68f7ef3e56a2cb300766fcbfc8f53bece56ba10b211df2c24c427df7c8b6ee69cd1edacf71e817d1732be3bfb85d1373f8a686c76ef9bcc071ec028341e7de4be5fd99c7206e9476cd1383ebbc1995ef09d5cc478ffb9623763507f12dd4a9b2f5a4ffbcf2a199fd9c7828ed65136c0918343a5dfed82789658f4dcaea806b229e7420a7d9a7e357280556a09f720571916b7efd1e0e2ebd1cedf2fb86c4eadae8fffd51309009058b0756e939541e972e4be30253bd277a43c27e83020223eab9bff1cfb332c59365113d8532c31a77945bba3e680e522b2d284997090a95ebf955fd05a6284f46db6a90d8f30968fd30a0517f46bfc3bcb9aad542da3b3cec430e25ee339485f17747b4ca72f900f831b8de74a858c982f73a3a30b3d816691d50226c1ce61c7549e8892180248544d0d99346489d38dcb041c4c43bef1beb5771df4af8cd8a3bd205314ffe08079041e8ce4733184c3bc24b124837acd90b31ac6fc5a4a2d0364143bb8f6ed60cb3860cdd5b4179c6a80f4c5f3a6e1437ec29d89f726ec776a5e784c4eba2dce6fab2e83174ee2a9a2a9672087ff4aa7e452ad1843546d44eda2c8c33a1043d06b4727f567d6c0693287c514834a033f4893739b80d99d35e45e7ad899d8740d901071e04eb2e930783bfe738d0e67e6df383919d73c12339dbafbc72da544511d00051c7629ffdc109b37ace21c9675cd54e5dfe6a36e48cf62d3f3431a1f8e2bfdf8c4207db66783b3d33fd755b9cdcc4e19c7b8dd78f6c2317ab8fa5da99c846567d1eee89b4a29fb44667991daf9490494f82721fbce475dec5f2fbd4aefac331d41a6fc60b4a54ea939c4128c1127098211714ea0e4843a2befadb4d6389be76e2a790d397752c78bf3b84465d3fc9c250cc5f43695b49c3f2fc078781983092b0a00e6c2b87e881fa1806c38118cce85cbf61d372a1574e2a5dc4898a99781ae7191430ecf7b51f248d5175adf00c69723c592ef6042f90954ead480c4d1cbd6197a6e5b16cc3c52578642df273677527b5ee8301ea2f891687d852ebefff6ef29eab71efd056b992a809af4f100adffda3080298f35c010a540785d80e7b21215052175e6ed0c8abb24633d5e39c7fd14c054a90f9ed4c6ac9203866047110abdad38c39ba994b613298b06085c1ac5382b506c90b8e0a452f5aa2769cc540aabed921d3699e10b408cd37118b3dc157c24df45c0cb1ac9f5e1f4a29c9542976a5cf7db3914f8ddcffbea353dca70ea94ec476f01cbf04f1d0cbb8db92109355a714ec7c361b9b88b737f6a36cefa2620b98cbe65769fdc33a061edb215ab5b693f27a1fae63a2507295615295cb148abccdb711133908dab3ec377251760936cd8dc2e59e037befcfacc17ff876e55cd3f66e6c6744589a112b3104ed265fb6ac94092d3c709181868c82c1211ad0e327e57fb0c9fce2ed43ac36a603928a366b0f1e95b16fad594ef43b8a6135b4e93eea2565a4468e423949871cd6faaa74bc6a984214b9c4854bafaea6698802be1fac06c6055a45ce4b86ddc230862363c612a2c7c2bf08c876f8c20f5beb134f04e5cdbed996dd54e5bac619d16aba136f9db47c8739f5aa04b9bc16feaaf0a4f47d5ee9e6a8eb1d72ca487baa33141d87d879298fc1057c9aee7b4d6beb5025c7b6c1d0e214d18e749bd6e1669ec3ccc1c1a4164b31fd9a0452d7214bb97bccdb8df0b2634122ad3bb008fb011cbdcc1b80653c3d8bf8346efa39674c23d6d59610e72e2f520667e7572e59a08b27855b4011f644f94e70a0e4ac59d1d5730f187016aa847aaaff4610071c494c01f9f768c27765e911704eb95a26b26d04b68f8a0512c55204ebf6870088972ea74c9014ab9239696bf6b6573c0a845c2260634f7c8261adc05c5d9e8b9ea5c87a9169919bd72cceecedc7eac5fdcd0073c67bd8bb9613d3c95cd00cc0d07a8d0c73911c442c8f92329f9b2980a9b6413c0618aa3ebe59d3a4beca3d2fb0881f56db7880b70973220a1da6232ace4d468696c29e9184b79a1634d74d651812bc861f0ef99a3b6f02c8ea4babad622f37f6861ac62da0d7f7c15ba94e7c90757520119c59419201f12e125bef13d5921fc60c80928081fb428dd", 0x1000}, 0x1006) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) close(r2) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)) 03:34:26 executing program 5: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getgroups(0x0, &(0x7f0000000800)) setxattr$trusted_overlay_origin(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='trusted.overlay.origin\x00', &(0x7f0000000cc0)='y\x00', 0x2, 0x0) 03:34:26 executing program 0: clock_gettime(0x9, &(0x7f0000000180)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000140), 0x0) socket$pppoe(0x18, 0x1, 0x0) geteuid() getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000500)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000c40), &(0x7f0000000680), &(0x7f0000000c80)) getegid() getegid() lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000b40)=ANY=[], 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffff9c) syz_execute_func(&(0x7f0000000080)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") clock_gettime(0x0, &(0x7f00000006c0)) 03:34:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) write$UHID_INPUT(r2, &(0x7f00000006c0)={0x8, "8a86178fa586f8d7213aa6f466b75fbd67c374b74de1e88fe8c72c7fba4798e26decc37ff822c391800352d9d7d7158d1b50980d28c7851cebb41adce735a45ffa614ff0399040d8132bf9d8f365b410d43b39d9afe87b7788320844586cf499cbfda2bc1f20243743a806e0ab4eb95aecf9eda5e4cc0862f25347e5393259c2349be172c9887a852a836de14d083cfbe9e1f18b2f85f317bfd0a5f09118a76b138f87334ed4cf8a6ab01aa191e987be4326b30b7705e16f2301f8351f2eac77eb423a640333b176ea1f57829b092d3e4a6db85313996ceab8323a5689345569cc675a4242395f0892b84deb3f4343d6ac0d86892a0805b28620f8fcc0a136a21cf0a97a74496eb7de14302566ae981d29152abb0a4a12b14d4ae46aa877c26c4391e9098c3ce73092730a11721cee318deec061a94603b04511eb85b5a67c4a49a38fc09d0955e760c6708f8e30967a6729c1b72f2cce270cf4c466e9d688e11e411f2405e036fb9b4e8c8c7b8c83dec3f60f7392715300a57287d59c0f0833a6fc56eb92282b10c9e206b4b0f981bc47a54877c8b16883b50c0662a599806d8ad4cde76d2b44e2050b6d0d96824b7f2359aa054e437b16e6120d62581ca77504474bb7168b1e801e163cb4b3b549496a5c2c4d47ee7ff461078d556deaf8c5b57c43607198d873d8af529642fc92432da63e22556276b880e72a3a5ee5325bdba25b1c59b7a8cf90565eadca736853c7b2ceb789517a119e0be9a6d199e7a56613d51df6642e3a4bfc49a99fe81b36442bea81da216a8f51086cf4dffb87ab33084b8da84eccc6950ea733358ac25c3456a19be352de31b4ed4776897a8321007fb9663e2804f061b3e82b1e4893efa492f96d05ee6f1ec2c8ce46d4146ff0ca867607965502d404f84b5eadb19c23843e0a7fb2184416c4e3bfeeea54597b1e96968108088a7caeaee4fac75aa955a9c4ae7cd0e9a3cc140d50c57a8a1c167dc516c926737abebeedf2b8b11177936ff1ed2f831eee10d465fb75e70d787de54ccff6d6c273aa77cee9da5daae5e1a6a70872e564b097447e9fe4aeea67a5d2b5d98cf725ece1699b88bc24e6a376818faed2213a26ccd1888c7edb77eb54960217d2ea3bc76430f58d85affed832131e67e9b7624ee76d8553d3def452e89d9f6d2cba3a2afc489ef3ac3823d133b9ba917696ae0053e68d0a68d56b2ddf4dddd016e5510abc46e413ae242198ac362b3ac4b151d9513b461d91a2e1b4d6818e9b85a9ed1f0292ccd94063c246fcde8be7204d990648e5ef7d010429fbe6c613ffa7880700a5dc35724e1e80cfc1a5df4ec6aed73096707215cdd04f3bc797c9e8b45d06e43e1ba19acb52fd69df0d8c39a83a7973203146c28fc8b9451d90c6dd7f57af2eb7f3db1aac6f68c9bf232dc497a83e4529b67e308f73de176fb6738e769d2946b5a3b18b3566f9698bff7cba27d0723bd3f376fee0d8cb5ca8bdcc46c45e40bb44e20d3d403324c056b1c24f5fc16a2f286cbe4afa6fa8c38eae567ed8828fd62796c01c95cf7038808edcc1c38f31f2aae372d951916b7eadd615d6ea2d3e7d90aa453bd5db3ebff5911b945a676063a9c8308be4470cc7fec00c493128e08c254e85f0bc7abe17f9016b0f75a7137c700afec1b93bea6d79042a19906e1a609c568d23b38bc785303c68afe2fa6739b49224abfcc8a1a1d0405f468deeb3c79249599d3416633fe05a9136eea2cd25a707e9e76edfc1ee34668493cffe3c4d78197ca4704065ddc95c9b458f989cc5f39ab3c90500c9e4e756baafcca032bbf3d79b78f7ea1c33c13465f05f5f41f65bc3f37705c08210e6501646e09a4a31fac0e62faff24f5fcb9aaafccae34c5090aade82244daca2a5a280b926213414a7f65698a8a4558a6a35b6c9643c32271ba535a4cb7f37160a356769b9e87c125c466b2efe3735e2ff3c85e8f725540a4e1937c3164dc69256f7a9ee7e952ec5939f55b63be3203eda1d27f6009477c7f9aba258ceb1cca6b5986f98cab0d110c40ffeabfadc0d1e273395a1af3f6f6d472961f5f81fb9a6d20d0d7e953405248099a6d2d01d604ed8fc7b23f7dfc80403d866ea4015cb3ac06ff516e0dcc1cfb873e02a4a3025bdcdc04ea4e06905843267967ea9993c4ba4dd5b43ce979841a2280d01e885cf8a8ac7a5805da4d0c82c66ed69494725e4cb8a1c194d65437f11fc5dbfc90329621e7289bf805a0e6b63408375f769386cf091772a54791204446bc58af28d176cc6d366186164665dcb2627e50b86bcc540ddc32c678d83e7cacc306b0ac5e9c21687f08f392c244f05d3444c06c993dda0cc83494637e099ec5b5677f73b0d1c43194708afe8c5573152ea5025e3a7aeec319cff78906a9e5dbac737283fe94c34915a3327fba27cf337e8503c665abaf53c0a7fcfedbc00188c6537d136deae38eea167e5f598aeedb0258b1adce55f0ee545ac4cd86bed5388c92364fe2dc43c2c7f6bbef35832dab7359a66359e9fc2f8d9de13fac9a1dbbf8a4a09711f6c880c8d3e3e36d14dd4c7d309c98a27a0cbea0e336f106c63128504227fad86063e5cc10bbb1a8bea86fbe4cc9e8bf15ec8a30559bdbda78684e0e5f3b65d4601c98cd706c3f13f059ff735ca8abb72ffc3808233b993205a35669f1fcf28ba7df9a5cd228ca883deaabd43362b8dd5cf122ccdd12a845e1f0feb03f43f55295f774bc94d2d93887044cbde7bc5a4deb3bfc4d26d29e4fd6d4e88ea92f47b6d11e3a3fa003baab78544935e92b76055f4829cfa131ca30dffc25f65e68872485af67a2401a423f80b1950507c8498c835a5e1dd1ffd14ba2b4d4266606f3a1abf7c35db4640c39f6598f5e197d531a5e25dacc4491b8f041d41d86230767354c6d35899881d826810cb3cb58269c318f279958a2273435a51e77b99a4272ad9009c460d061237156f3b797044374ae847753473a1e77dea435e67262ffdc449be1e1647e6c2c242daee1b5e8f8df2a8ebdf24cfa59e5c32e22dadf91e505a46fcc76801dfd78a5b4cc023cfe866f50d850716be1b88cf2795db087c0d3a55eff4429ceb4e2b39efc15f9360fa5e77c21af1ef751dc73f97cddc0955d008dd10a58626dc33d29042c893756ef618b140aeefa7d0618ebf92815275fe6957a0226c7c732c343f40f213d307ab6bb01c50e82779c46b3985bce56770c747b791b40c4eede98d08c36cec7e37938c4316e907f0193553d6ab62fc1f602d0ad6bf7eda74b7e0eb45be0bf75529299f96d12d4902ddd76876da82819c307386b8487150e11bfd70170bf247010c06b4800d8ae8e5e1f35ade7e2569f8059cd443650f2474f4a0319540afc4fa94018c659b640bb7f7f55ae18b641d9a79656701ac5f31f76c630ddb6faa07a901b7c2a878fa11e6d59c71f043ed6ed1c5454f96edfc4be2c8227a3514baae90c0d41b982cb3b79748f5a90cd3c074a145861658a5798ba6c9f5390e074437c411d4e08c7addd326085996c6f2ea772f33943d1ed32e3a54bcca5c09119d3c3f96ab2af62d7035984a4457b99d5f02ffd6fbebc1da7cc733f0c7f1fec2f601b046eb8dec964474d0205a13710630ba7468ca8807b028cdaaeb1970fd8d31a68f7ef3e56a2cb300766fcbfc8f53bece56ba10b211df2c24c427df7c8b6ee69cd1edacf71e817d1732be3bfb85d1373f8a686c76ef9bcc071ec028341e7de4be5fd99c7206e9476cd1383ebbc1995ef09d5cc478ffb9623763507f12dd4a9b2f5a4ffbcf2a199fd9c7828ed65136c0918343a5dfed82789658f4dcaea806b229e7420a7d9a7e357280556a09f720571916b7efd1e0e2ebd1cedf2fb86c4eadae8fffd51309009058b0756e939541e972e4be30253bd277a43c27e83020223eab9bff1cfb332c59365113d8532c31a77945bba3e680e522b2d284997090a95ebf955fd05a6284f46db6a90d8f30968fd30a0517f46bfc3bcb9aad542da3b3cec430e25ee339485f17747b4ca72f900f831b8de74a858c982f73a3a30b3d816691d50226c1ce61c7549e8892180248544d0d99346489d38dcb041c4c43bef1beb5771df4af8cd8a3bd205314ffe08079041e8ce4733184c3bc24b124837acd90b31ac6fc5a4a2d0364143bb8f6ed60cb3860cdd5b4179c6a80f4c5f3a6e1437ec29d89f726ec776a5e784c4eba2dce6fab2e83174ee2a9a2a9672087ff4aa7e452ad1843546d44eda2c8c33a1043d06b4727f567d6c0693287c514834a033f4893739b80d99d35e45e7ad899d8740d901071e04eb2e930783bfe738d0e67e6df383919d73c12339dbafbc72da544511d00051c7629ffdc109b37ace21c9675cd54e5dfe6a36e48cf62d3f3431a1f8e2bfdf8c4207db66783b3d33fd755b9cdcc4e19c7b8dd78f6c2317ab8fa5da99c846567d1eee89b4a29fb44667991daf9490494f82721fbce475dec5f2fbd4aefac331d41a6fc60b4a54ea939c4128c1127098211714ea0e4843a2befadb4d6389be76e2a790d397752c78bf3b84465d3fc9c250cc5f43695b49c3f2fc078781983092b0a00e6c2b87e881fa1806c38118cce85cbf61d372a1574e2a5dc4898a99781ae7191430ecf7b51f248d5175adf00c69723c592ef6042f90954ead480c4d1cbd6197a6e5b16cc3c52578642df273677527b5ee8301ea2f891687d852ebefff6ef29eab71efd056b992a809af4f100adffda3080298f35c010a540785d80e7b21215052175e6ed0c8abb24633d5e39c7fd14c054a90f9ed4c6ac9203866047110abdad38c39ba994b613298b06085c1ac5382b506c90b8e0a452f5aa2769cc540aabed921d3699e10b408cd37118b3dc157c24df45c0cb1ac9f5e1f4a29c9542976a5cf7db3914f8ddcffbea353dca70ea94ec476f01cbf04f1d0cbb8db92109355a714ec7c361b9b88b737f6a36cefa2620b98cbe65769fdc33a061edb215ab5b693f27a1fae63a2507295615295cb148abccdb711133908dab3ec377251760936cd8dc2e59e037befcfacc17ff876e55cd3f66e6c6744589a112b3104ed265fb6ac94092d3c709181868c82c1211ad0e327e57fb0c9fce2ed43ac36a603928a366b0f1e95b16fad594ef43b8a6135b4e93eea2565a4468e423949871cd6faaa74bc6a984214b9c4854bafaea6698802be1fac06c6055a45ce4b86ddc230862363c612a2c7c2bf08c876f8c20f5beb134f04e5cdbed996dd54e5bac619d16aba136f9db47c8739f5aa04b9bc16feaaf0a4f47d5ee9e6a8eb1d72ca487baa33141d87d879298fc1057c9aee7b4d6beb5025c7b6c1d0e214d18e749bd6e1669ec3ccc1c1a4164b31fd9a0452d7214bb97bccdb8df0b2634122ad3bb008fb011cbdcc1b80653c3d8bf8346efa39674c23d6d59610e72e2f520667e7572e59a08b27855b4011f644f94e70a0e4ac59d1d5730f187016aa847aaaff4610071c494c01f9f768c27765e911704eb95a26b26d04b68f8a0512c55204ebf6870088972ea74c9014ab9239696bf6b6573c0a845c2260634f7c8261adc05c5d9e8b9ea5c87a9169919bd72cceecedc7eac5fdcd0073c67bd8bb9613d3c95cd00cc0d07a8d0c73911c442c8f92329f9b2980a9b6413c0618aa3ebe59d3a4beca3d2fb0881f56db7880b70973220a1da6232ace4d468696c29e9184b79a1634d74d651812bc861f0ef99a3b6f02c8ea4babad622f37f6861ac62da0d7f7c15ba94e7c90757520119c59419201f12e125bef13d5921fc60c80928081fb428dd", 0x1000}, 0x1006) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) close(r2) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)) 03:34:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) write$UHID_INPUT(r2, &(0x7f00000006c0)={0x8, "8a86178fa586f8d7213aa6f466b75fbd67c374b74de1e88fe8c72c7fba4798e26decc37ff822c391800352d9d7d7158d1b50980d28c7851cebb41adce735a45ffa614ff0399040d8132bf9d8f365b410d43b39d9afe87b7788320844586cf499cbfda2bc1f20243743a806e0ab4eb95aecf9eda5e4cc0862f25347e5393259c2349be172c9887a852a836de14d083cfbe9e1f18b2f85f317bfd0a5f09118a76b138f87334ed4cf8a6ab01aa191e987be4326b30b7705e16f2301f8351f2eac77eb423a640333b176ea1f57829b092d3e4a6db85313996ceab8323a5689345569cc675a4242395f0892b84deb3f4343d6ac0d86892a0805b28620f8fcc0a136a21cf0a97a74496eb7de14302566ae981d29152abb0a4a12b14d4ae46aa877c26c4391e9098c3ce73092730a11721cee318deec061a94603b04511eb85b5a67c4a49a38fc09d0955e760c6708f8e30967a6729c1b72f2cce270cf4c466e9d688e11e411f2405e036fb9b4e8c8c7b8c83dec3f60f7392715300a57287d59c0f0833a6fc56eb92282b10c9e206b4b0f981bc47a54877c8b16883b50c0662a599806d8ad4cde76d2b44e2050b6d0d96824b7f2359aa054e437b16e6120d62581ca77504474bb7168b1e801e163cb4b3b549496a5c2c4d47ee7ff461078d556deaf8c5b57c43607198d873d8af529642fc92432da63e22556276b880e72a3a5ee5325bdba25b1c59b7a8cf90565eadca736853c7b2ceb789517a119e0be9a6d199e7a56613d51df6642e3a4bfc49a99fe81b36442bea81da216a8f51086cf4dffb87ab33084b8da84eccc6950ea733358ac25c3456a19be352de31b4ed4776897a8321007fb9663e2804f061b3e82b1e4893efa492f96d05ee6f1ec2c8ce46d4146ff0ca867607965502d404f84b5eadb19c23843e0a7fb2184416c4e3bfeeea54597b1e96968108088a7caeaee4fac75aa955a9c4ae7cd0e9a3cc140d50c57a8a1c167dc516c926737abebeedf2b8b11177936ff1ed2f831eee10d465fb75e70d787de54ccff6d6c273aa77cee9da5daae5e1a6a70872e564b097447e9fe4aeea67a5d2b5d98cf725ece1699b88bc24e6a376818faed2213a26ccd1888c7edb77eb54960217d2ea3bc76430f58d85affed832131e67e9b7624ee76d8553d3def452e89d9f6d2cba3a2afc489ef3ac3823d133b9ba917696ae0053e68d0a68d56b2ddf4dddd016e5510abc46e413ae242198ac362b3ac4b151d9513b461d91a2e1b4d6818e9b85a9ed1f0292ccd94063c246fcde8be7204d990648e5ef7d010429fbe6c613ffa7880700a5dc35724e1e80cfc1a5df4ec6aed73096707215cdd04f3bc797c9e8b45d06e43e1ba19acb52fd69df0d8c39a83a7973203146c28fc8b9451d90c6dd7f57af2eb7f3db1aac6f68c9bf232dc497a83e4529b67e308f73de176fb6738e769d2946b5a3b18b3566f9698bff7cba27d0723bd3f376fee0d8cb5ca8bdcc46c45e40bb44e20d3d403324c056b1c24f5fc16a2f286cbe4afa6fa8c38eae567ed8828fd62796c01c95cf7038808edcc1c38f31f2aae372d951916b7eadd615d6ea2d3e7d90aa453bd5db3ebff5911b945a676063a9c8308be4470cc7fec00c493128e08c254e85f0bc7abe17f9016b0f75a7137c700afec1b93bea6d79042a19906e1a609c568d23b38bc785303c68afe2fa6739b49224abfcc8a1a1d0405f468deeb3c79249599d3416633fe05a9136eea2cd25a707e9e76edfc1ee34668493cffe3c4d78197ca4704065ddc95c9b458f989cc5f39ab3c90500c9e4e756baafcca032bbf3d79b78f7ea1c33c13465f05f5f41f65bc3f37705c08210e6501646e09a4a31fac0e62faff24f5fcb9aaafccae34c5090aade82244daca2a5a280b926213414a7f65698a8a4558a6a35b6c9643c32271ba535a4cb7f37160a356769b9e87c125c466b2efe3735e2ff3c85e8f725540a4e1937c3164dc69256f7a9ee7e952ec5939f55b63be3203eda1d27f6009477c7f9aba258ceb1cca6b5986f98cab0d110c40ffeabfadc0d1e273395a1af3f6f6d472961f5f81fb9a6d20d0d7e953405248099a6d2d01d604ed8fc7b23f7dfc80403d866ea4015cb3ac06ff516e0dcc1cfb873e02a4a3025bdcdc04ea4e06905843267967ea9993c4ba4dd5b43ce979841a2280d01e885cf8a8ac7a5805da4d0c82c66ed69494725e4cb8a1c194d65437f11fc5dbfc90329621e7289bf805a0e6b63408375f769386cf091772a54791204446bc58af28d176cc6d366186164665dcb2627e50b86bcc540ddc32c678d83e7cacc306b0ac5e9c21687f08f392c244f05d3444c06c993dda0cc83494637e099ec5b5677f73b0d1c43194708afe8c5573152ea5025e3a7aeec319cff78906a9e5dbac737283fe94c34915a3327fba27cf337e8503c665abaf53c0a7fcfedbc00188c6537d136deae38eea167e5f598aeedb0258b1adce55f0ee545ac4cd86bed5388c92364fe2dc43c2c7f6bbef35832dab7359a66359e9fc2f8d9de13fac9a1dbbf8a4a09711f6c880c8d3e3e36d14dd4c7d309c98a27a0cbea0e336f106c63128504227fad86063e5cc10bbb1a8bea86fbe4cc9e8bf15ec8a30559bdbda78684e0e5f3b65d4601c98cd706c3f13f059ff735ca8abb72ffc3808233b993205a35669f1fcf28ba7df9a5cd228ca883deaabd43362b8dd5cf122ccdd12a845e1f0feb03f43f55295f774bc94d2d93887044cbde7bc5a4deb3bfc4d26d29e4fd6d4e88ea92f47b6d11e3a3fa003baab78544935e92b76055f4829cfa131ca30dffc25f65e68872485af67a2401a423f80b1950507c8498c835a5e1dd1ffd14ba2b4d4266606f3a1abf7c35db4640c39f6598f5e197d531a5e25dacc4491b8f041d41d86230767354c6d35899881d826810cb3cb58269c318f279958a2273435a51e77b99a4272ad9009c460d061237156f3b797044374ae847753473a1e77dea435e67262ffdc449be1e1647e6c2c242daee1b5e8f8df2a8ebdf24cfa59e5c32e22dadf91e505a46fcc76801dfd78a5b4cc023cfe866f50d850716be1b88cf2795db087c0d3a55eff4429ceb4e2b39efc15f9360fa5e77c21af1ef751dc73f97cddc0955d008dd10a58626dc33d29042c893756ef618b140aeefa7d0618ebf92815275fe6957a0226c7c732c343f40f213d307ab6bb01c50e82779c46b3985bce56770c747b791b40c4eede98d08c36cec7e37938c4316e907f0193553d6ab62fc1f602d0ad6bf7eda74b7e0eb45be0bf75529299f96d12d4902ddd76876da82819c307386b8487150e11bfd70170bf247010c06b4800d8ae8e5e1f35ade7e2569f8059cd443650f2474f4a0319540afc4fa94018c659b640bb7f7f55ae18b641d9a79656701ac5f31f76c630ddb6faa07a901b7c2a878fa11e6d59c71f043ed6ed1c5454f96edfc4be2c8227a3514baae90c0d41b982cb3b79748f5a90cd3c074a145861658a5798ba6c9f5390e074437c411d4e08c7addd326085996c6f2ea772f33943d1ed32e3a54bcca5c09119d3c3f96ab2af62d7035984a4457b99d5f02ffd6fbebc1da7cc733f0c7f1fec2f601b046eb8dec964474d0205a13710630ba7468ca8807b028cdaaeb1970fd8d31a68f7ef3e56a2cb300766fcbfc8f53bece56ba10b211df2c24c427df7c8b6ee69cd1edacf71e817d1732be3bfb85d1373f8a686c76ef9bcc071ec028341e7de4be5fd99c7206e9476cd1383ebbc1995ef09d5cc478ffb9623763507f12dd4a9b2f5a4ffbcf2a199fd9c7828ed65136c0918343a5dfed82789658f4dcaea806b229e7420a7d9a7e357280556a09f720571916b7efd1e0e2ebd1cedf2fb86c4eadae8fffd51309009058b0756e939541e972e4be30253bd277a43c27e83020223eab9bff1cfb332c59365113d8532c31a77945bba3e680e522b2d284997090a95ebf955fd05a6284f46db6a90d8f30968fd30a0517f46bfc3bcb9aad542da3b3cec430e25ee339485f17747b4ca72f900f831b8de74a858c982f73a3a30b3d816691d50226c1ce61c7549e8892180248544d0d99346489d38dcb041c4c43bef1beb5771df4af8cd8a3bd205314ffe08079041e8ce4733184c3bc24b124837acd90b31ac6fc5a4a2d0364143bb8f6ed60cb3860cdd5b4179c6a80f4c5f3a6e1437ec29d89f726ec776a5e784c4eba2dce6fab2e83174ee2a9a2a9672087ff4aa7e452ad1843546d44eda2c8c33a1043d06b4727f567d6c0693287c514834a033f4893739b80d99d35e45e7ad899d8740d901071e04eb2e930783bfe738d0e67e6df383919d73c12339dbafbc72da544511d00051c7629ffdc109b37ace21c9675cd54e5dfe6a36e48cf62d3f3431a1f8e2bfdf8c4207db66783b3d33fd755b9cdcc4e19c7b8dd78f6c2317ab8fa5da99c846567d1eee89b4a29fb44667991daf9490494f82721fbce475dec5f2fbd4aefac331d41a6fc60b4a54ea939c4128c1127098211714ea0e4843a2befadb4d6389be76e2a790d397752c78bf3b84465d3fc9c250cc5f43695b49c3f2fc078781983092b0a00e6c2b87e881fa1806c38118cce85cbf61d372a1574e2a5dc4898a99781ae7191430ecf7b51f248d5175adf00c69723c592ef6042f90954ead480c4d1cbd6197a6e5b16cc3c52578642df273677527b5ee8301ea2f891687d852ebefff6ef29eab71efd056b992a809af4f100adffda3080298f35c010a540785d80e7b21215052175e6ed0c8abb24633d5e39c7fd14c054a90f9ed4c6ac9203866047110abdad38c39ba994b613298b06085c1ac5382b506c90b8e0a452f5aa2769cc540aabed921d3699e10b408cd37118b3dc157c24df45c0cb1ac9f5e1f4a29c9542976a5cf7db3914f8ddcffbea353dca70ea94ec476f01cbf04f1d0cbb8db92109355a714ec7c361b9b88b737f6a36cefa2620b98cbe65769fdc33a061edb215ab5b693f27a1fae63a2507295615295cb148abccdb711133908dab3ec377251760936cd8dc2e59e037befcfacc17ff876e55cd3f66e6c6744589a112b3104ed265fb6ac94092d3c709181868c82c1211ad0e327e57fb0c9fce2ed43ac36a603928a366b0f1e95b16fad594ef43b8a6135b4e93eea2565a4468e423949871cd6faaa74bc6a984214b9c4854bafaea6698802be1fac06c6055a45ce4b86ddc230862363c612a2c7c2bf08c876f8c20f5beb134f04e5cdbed996dd54e5bac619d16aba136f9db47c8739f5aa04b9bc16feaaf0a4f47d5ee9e6a8eb1d72ca487baa33141d87d879298fc1057c9aee7b4d6beb5025c7b6c1d0e214d18e749bd6e1669ec3ccc1c1a4164b31fd9a0452d7214bb97bccdb8df0b2634122ad3bb008fb011cbdcc1b80653c3d8bf8346efa39674c23d6d59610e72e2f520667e7572e59a08b27855b4011f644f94e70a0e4ac59d1d5730f187016aa847aaaff4610071c494c01f9f768c27765e911704eb95a26b26d04b68f8a0512c55204ebf6870088972ea74c9014ab9239696bf6b6573c0a845c2260634f7c8261adc05c5d9e8b9ea5c87a9169919bd72cceecedc7eac5fdcd0073c67bd8bb9613d3c95cd00cc0d07a8d0c73911c442c8f92329f9b2980a9b6413c0618aa3ebe59d3a4beca3d2fb0881f56db7880b70973220a1da6232ace4d468696c29e9184b79a1634d74d651812bc861f0ef99a3b6f02c8ea4babad622f37f6861ac62da0d7f7c15ba94e7c90757520119c59419201f12e125bef13d5921fc60c80928081fb428dd", 0x1000}, 0x1006) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) close(r2) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)) 03:34:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) write$UHID_INPUT(r2, &(0x7f00000006c0)={0x8, "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", 0x1000}, 0x1006) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) close(r2) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)) 03:34:26 executing program 4: pipe2(&(0x7f0000001300), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='/proc/self/net/pfkey\x00'}, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000280), &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000300), 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') socket$inet_tcp(0x2, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) geteuid() getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0), &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000002c0), 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={"626f6e645f736c6176655f30000e00", {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$inet(0xffffffffffffffff, &(0x7f0000dc9ff0)={0x2, 0x0, @rand_addr}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f00000012c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)) chdir(&(0x7f0000001340)='./bus\x00') syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000200)) creat(&(0x7f0000000100)='./bus\x00', 0x0) 03:34:26 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000240)=@getae={0x40, 0x1f, 0x0, 0x0, 0x0, {{@in6=@dev}, @in=@multicast2}}, 0x40}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000006c0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @local}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000480)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[], 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000700)) io_setup(0x0, &(0x7f0000000600)) pipe(&(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:26 executing program 2: prctl$setname(0x1d, &(0x7f0000000380)='/dev/midi#\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") 03:34:26 executing program 1: sysinfo(&(0x7f00000001c0)=""/200) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000003c0)) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000440), 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000001ec0), &(0x7f0000001f00)=0x10, 0x0) dup(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) dup(0xffffffffffffff9c) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x88) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$seccomp(0x23, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000500)}) io_setup(0x0, &(0x7f0000000200)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=0x14) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 03:34:26 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000280)={0x28, 0x0, 0x0, @host}, 0x10, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000640)=0xc) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000b00)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@ipv4={[], [], @dev}, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000025c0), &(0x7f0000002600)=0xc) getgroups(0x0, &(0x7f0000002640)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002680)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000026c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@loopback}}}, &(0x7f00000027c0)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002800)) fstat(0xffffffffffffffff, &(0x7f0000002840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002940)) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000002a40)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002bc0)={&(0x7f00000001c0), 0xc, &(0x7f0000000d40), 0x0, &(0x7f0000002ac0)}, 0x0) mknod(&(0x7f00007f2ff8)='./file0\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000380)) sendmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) open(&(0x7f00007ddff8)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000300)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000400)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") 03:34:27 executing program 0: clock_gettime(0x9, &(0x7f0000000180)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000140), 0x0) socket$pppoe(0x18, 0x1, 0x0) geteuid() getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000500)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000c40), &(0x7f0000000680), &(0x7f0000000c80)) getegid() getegid() lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000b40)=ANY=[], 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffff9c) syz_execute_func(&(0x7f0000000080)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") clock_gettime(0x0, &(0x7f00000006c0)) 03:34:27 executing program 4: pipe2(&(0x7f0000001300), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='/proc/self/net/pfkey\x00'}, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000280), &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000300), 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') socket$inet_tcp(0x2, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) geteuid() getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0), &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000002c0), 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={"626f6e645f736c6176655f30000e00", {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$inet(0xffffffffffffffff, &(0x7f0000dc9ff0)={0x2, 0x0, @rand_addr}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f00000012c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)) chdir(&(0x7f0000001340)='./bus\x00') syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000200)) creat(&(0x7f0000000100)='./bus\x00', 0x0) 03:34:27 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000240)=@getae={0x40, 0x1f, 0x0, 0x0, 0x0, {{@in6=@dev}, @in=@multicast2}}, 0x40}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000006c0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @local}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000480)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[], 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000700)) io_setup(0x0, &(0x7f0000000600)) pipe(&(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:27 executing program 2: set_mempolicy(0x1, &(0x7f0000000040), 0x3) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:34:27 executing program 1: sysinfo(&(0x7f00000001c0)=""/200) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000003c0)) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000440), 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000001ec0), &(0x7f0000001f00)=0x10, 0x0) dup(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) dup(0xffffffffffffff9c) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x88) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$seccomp(0x23, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000500)}) io_setup(0x0, &(0x7f0000000200)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=0x14) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 03:34:27 executing program 2: set_mempolicy(0x1, &(0x7f0000000040), 0x3) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:34:27 executing program 2: set_mempolicy(0x1, &(0x7f0000000040), 0x3) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:34:27 executing program 0: keyctl$setperm(0x2, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") clock_gettime(0x0, &(0x7f0000000040)) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x7e, 0x0) io_setup(0x0, &(0x7f0000000180)) io_submit(0x0, 0x0, &(0x7f00000001c0)) io_submit(0x0, 0x0, &(0x7f0000000440)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@rand_addr, @in6}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @dev, @multicast1}, &(0x7f00000007c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000800)={@mcast1}, &(0x7f0000000840)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000cc0)={@broadcast, @loopback}, &(0x7f0000000d00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@multicast1, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000e40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000ec0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0xfffffffffffffd71, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000fc0)=@can, &(0x7f0000001040)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001080)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001180)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001200)={'veth0_to_team\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001640)=0x14) 03:34:28 executing program 2: set_mempolicy(0x1, &(0x7f0000000040), 0x3) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:34:28 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000280)={0x28, 0x0, 0x0, @host}, 0x10, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000640)=0xc) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000b00)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@ipv4={[], [], @dev}, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000025c0), &(0x7f0000002600)=0xc) getgroups(0x0, &(0x7f0000002640)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002680)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000026c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@loopback}}}, &(0x7f00000027c0)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002800)) fstat(0xffffffffffffffff, &(0x7f0000002840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002940)) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000002a40)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002bc0)={&(0x7f00000001c0), 0xc, &(0x7f0000000d40), 0x0, &(0x7f0000002ac0)}, 0x0) mknod(&(0x7f00007f2ff8)='./file0\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000380)) sendmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) open(&(0x7f00007ddff8)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000300)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000400)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") 03:34:28 executing program 2: getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, &(0x7f0000000200)=""/126, 0x7e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='em0-self)-\x00', 0xffffffffffffff9c}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000140), 0x2) 03:34:28 executing program 3: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f70726f632f73656c662f6e65742f70666b65795d663c1f00", 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) rename(&(0x7f0000002180)='./file0\x00', &(0x7f00000029c0)='./file0\x00') syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000002cc0)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000a80)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000c00)=0xc) lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) stat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f0000001400)) getgid() getgroups(0x0, &(0x7f0000000200)) keyctl$set_reqkey_keyring(0x16, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0xc) add_key(&(0x7f0000001940)='id_legacy\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989f") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f00000015c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002540)={{{@in6=@mcast1, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000002640)=0xe8) 03:34:28 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000200)={{0x80, 0x7a1b0b7d}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000080)={{0x80}, 'port0\x00'}) 03:34:28 executing program 1: sysinfo(&(0x7f00000001c0)=""/200) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000003c0)) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000440), 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000001ec0), &(0x7f0000001f00)=0x10, 0x0) dup(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) dup(0xffffffffffffff9c) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x88) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$seccomp(0x23, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000500)}) io_setup(0x0, &(0x7f0000000200)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=0x14) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 03:34:28 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000200)={{0x80, 0x7a1b0b7d}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000080)={{0x80}, 'port0\x00'}) 03:34:28 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000200)={{0x80, 0x7a1b0b7d}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000080)={{0x80}, 'port0\x00'}) 03:34:28 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000200)={{0x80, 0x7a1b0b7d}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000080)={{0x80}, 'port0\x00'}) 03:34:28 executing program 0: keyctl$setperm(0x2, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") clock_gettime(0x0, &(0x7f0000000040)) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x7e, 0x0) io_setup(0x0, &(0x7f0000000180)) io_submit(0x0, 0x0, &(0x7f00000001c0)) io_submit(0x0, 0x0, &(0x7f0000000440)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@rand_addr, @in6}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @dev, @multicast1}, &(0x7f00000007c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000800)={@mcast1}, &(0x7f0000000840)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000cc0)={@broadcast, @loopback}, &(0x7f0000000d00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@multicast1, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000e40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000ec0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0xfffffffffffffd71, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000fc0)=@can, &(0x7f0000001040)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001080)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001180)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001200)={'veth0_to_team\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001640)=0x14) 03:34:28 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000200)={{0x80, 0x7a1b0b7d}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000080)={{0x80}, 'port0\x00'}) 03:34:29 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000200)={{0x80, 0x7a1b0b7d}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000080)={{0x80}, 'port0\x00'}) 03:34:29 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000200)={{0x80, 0x7a1b0b7d}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000080)={{0x80}, 'port0\x00'}) 03:34:29 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000280)={0x28, 0x0, 0x0, @host}, 0x10, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000640)=0xc) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000b00)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@ipv4={[], [], @dev}, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000025c0), &(0x7f0000002600)=0xc) getgroups(0x0, &(0x7f0000002640)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002680)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000026c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@loopback}}}, &(0x7f00000027c0)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002800)) fstat(0xffffffffffffffff, &(0x7f0000002840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002940)) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000002a40)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002bc0)={&(0x7f00000001c0), 0xc, &(0x7f0000000d40), 0x0, &(0x7f0000002ac0)}, 0x0) mknod(&(0x7f00007f2ff8)='./file0\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000380)) sendmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) open(&(0x7f00007ddff8)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000300)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000400)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") 03:34:29 executing program 2: getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, &(0x7f0000000200)=""/126, 0x7e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='em0-self)-\x00', 0xffffffffffffff9c}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000140), 0x2) 03:34:29 executing program 4: prctl$intptr(0x27, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') 03:34:29 executing program 3: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f70726f632f73656c662f6e65742f70666b65795d663c1f00", 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) rename(&(0x7f0000002180)='./file0\x00', &(0x7f00000029c0)='./file0\x00') syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000002cc0)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000a80)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000c00)=0xc) lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) stat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f0000001400)) getgid() getgroups(0x0, &(0x7f0000000200)) keyctl$set_reqkey_keyring(0x16, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0xc) add_key(&(0x7f0000001940)='id_legacy\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989f") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f00000015c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002540)={{{@in6=@mcast1, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000002640)=0xe8) 03:34:29 executing program 1: sysinfo(&(0x7f00000001c0)=""/200) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000003c0)) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000440), 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000001ec0), &(0x7f0000001f00)=0x10, 0x0) dup(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) dup(0xffffffffffffff9c) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x88) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$seccomp(0x23, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000500)}) io_setup(0x0, &(0x7f0000000200)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=0x14) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 03:34:29 executing program 0: keyctl$setperm(0x2, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") clock_gettime(0x0, &(0x7f0000000040)) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x7e, 0x0) io_setup(0x0, &(0x7f0000000180)) io_submit(0x0, 0x0, &(0x7f00000001c0)) io_submit(0x0, 0x0, &(0x7f0000000440)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@rand_addr, @in6}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @dev, @multicast1}, &(0x7f00000007c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000800)={@mcast1}, &(0x7f0000000840)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000cc0)={@broadcast, @loopback}, &(0x7f0000000d00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@multicast1, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000e40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000ec0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0xfffffffffffffd71, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000fc0)=@can, &(0x7f0000001040)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001080)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001180)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001200)={'veth0_to_team\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001640)=0x14) 03:34:30 executing program 4: prctl$intptr(0x27, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') 03:34:30 executing program 1: mount(&(0x7f0000000480)=@loop={'/dev/loop'}, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)) futimesat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={{0x77359400}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) quotactl(0x0, &(0x7f00000001c0)='.\x00', 0x0, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)) read$eventfd(0xffffffffffffffff, &(0x7f0000000400), 0x2ea) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000180)={'ah\x00'}, &(0x7f0000000440)=0x1e) fstatfs(0xffffffffffffffff, &(0x7f0000000600)=""/4096) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380)='syzkaller0\x00', 0x10) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_route(0x10, 0x3, 0x0) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:30 executing program 2: getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, &(0x7f0000000200)=""/126, 0x7e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='em0-self)-\x00', 0xffffffffffffff9c}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000140), 0x2) 03:34:30 executing program 3: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f70726f632f73656c662f6e65742f70666b65795d663c1f00", 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) rename(&(0x7f0000002180)='./file0\x00', &(0x7f00000029c0)='./file0\x00') syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000002cc0)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000a80)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000c00)=0xc) lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) stat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f0000001400)) getgid() getgroups(0x0, &(0x7f0000000200)) keyctl$set_reqkey_keyring(0x16, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0xc) add_key(&(0x7f0000001940)='id_legacy\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989f") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f00000015c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002540)={{{@in6=@mcast1, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000002640)=0xe8) 03:34:30 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000280)={0x28, 0x0, 0x0, @host}, 0x10, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000640)=0xc) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000b00)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@ipv4={[], [], @dev}, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000025c0), &(0x7f0000002600)=0xc) getgroups(0x0, &(0x7f0000002640)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002680)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000026c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@loopback}}}, &(0x7f00000027c0)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002800)) fstat(0xffffffffffffffff, &(0x7f0000002840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002940)) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000002a40)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002bc0)={&(0x7f00000001c0), 0xc, &(0x7f0000000d40), 0x0, &(0x7f0000002ac0)}, 0x0) mknod(&(0x7f00007f2ff8)='./file0\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000380)) sendmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) open(&(0x7f00007ddff8)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000300)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000400)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") 03:34:30 executing program 0: keyctl$setperm(0x2, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") clock_gettime(0x0, &(0x7f0000000040)) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x7e, 0x0) io_setup(0x0, &(0x7f0000000180)) io_submit(0x0, 0x0, &(0x7f00000001c0)) io_submit(0x0, 0x0, &(0x7f0000000440)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@rand_addr, @in6}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @dev, @multicast1}, &(0x7f00000007c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000800)={@mcast1}, &(0x7f0000000840)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000cc0)={@broadcast, @loopback}, &(0x7f0000000d00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@multicast1, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000e40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000ec0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0xfffffffffffffd71, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000fc0)=@can, &(0x7f0000001040)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001080)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001180)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001200)={'veth0_to_team\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001640)=0x14) 03:34:31 executing program 4: prctl$intptr(0x27, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') 03:34:31 executing program 2: getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, &(0x7f0000000200)=""/126, 0x7e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='em0-self)-\x00', 0xffffffffffffff9c}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000140), 0x2) 03:34:31 executing program 1: mount(&(0x7f0000000480)=@loop={'/dev/loop'}, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)) futimesat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={{0x77359400}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) quotactl(0x0, &(0x7f00000001c0)='.\x00', 0x0, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)) read$eventfd(0xffffffffffffffff, &(0x7f0000000400), 0x2ea) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000180)={'ah\x00'}, &(0x7f0000000440)=0x1e) fstatfs(0xffffffffffffffff, &(0x7f0000000600)=""/4096) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380)='syzkaller0\x00', 0x10) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_route(0x10, 0x3, 0x0) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:31 executing program 3: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f70726f632f73656c662f6e65742f70666b65795d663c1f00", 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) rename(&(0x7f0000002180)='./file0\x00', &(0x7f00000029c0)='./file0\x00') syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000002cc0)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000a80)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000c00)=0xc) lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) stat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f0000001400)) getgid() getgroups(0x0, &(0x7f0000000200)) keyctl$set_reqkey_keyring(0x16, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0xc) add_key(&(0x7f0000001940)='id_legacy\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989f") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f00000015c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002540)={{{@in6=@mcast1, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000002640)=0xe8) 03:34:31 executing program 0: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, 0xe8) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) getuid() setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000c00), 0x14) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000040)='keyring\x00', &(0x7f0000000000), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000180)) 03:34:32 executing program 4: prctl$intptr(0x27, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') 03:34:32 executing program 5: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:32 executing program 2: lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x15, 0x0, 0x0, "566be62a8cdc3d8c27656b1bfde02667"}, 0x15, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:32 executing program 3: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getegid() getegid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:32 executing program 1: mount(&(0x7f0000000480)=@loop={'/dev/loop'}, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)) futimesat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={{0x77359400}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) quotactl(0x0, &(0x7f00000001c0)='.\x00', 0x0, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)) read$eventfd(0xffffffffffffffff, &(0x7f0000000400), 0x2ea) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000180)={'ah\x00'}, &(0x7f0000000440)=0x1e) fstatfs(0xffffffffffffffff, &(0x7f0000000600)=""/4096) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380)='syzkaller0\x00', 0x10) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_route(0x10, 0x3, 0x0) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:32 executing program 0: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, 0xe8) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) getuid() setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000c00), 0x14) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000040)='keyring\x00', &(0x7f0000000000), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000180)) 03:34:33 executing program 4: setitimer(0x0, &(0x7f0000000180)={{0x0, 0x2710}}, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:34:33 executing program 5: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:33 executing program 1: mount(&(0x7f0000000480)=@loop={'/dev/loop'}, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)) futimesat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={{0x77359400}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) quotactl(0x0, &(0x7f00000001c0)='.\x00', 0x0, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)) read$eventfd(0xffffffffffffffff, &(0x7f0000000400), 0x2ea) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000180)={'ah\x00'}, &(0x7f0000000440)=0x1e) fstatfs(0xffffffffffffffff, &(0x7f0000000600)=""/4096) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380)='syzkaller0\x00', 0x10) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_route(0x10, 0x3, 0x0) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:33 executing program 3: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getegid() getegid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:33 executing program 2: lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x15, 0x0, 0x0, "566be62a8cdc3d8c27656b1bfde02667"}, 0x15, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:33 executing program 0: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, 0xe8) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) getuid() setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000c00), 0x14) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000040)='keyring\x00', &(0x7f0000000000), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000180)) 03:34:34 executing program 4: setitimer(0x0, &(0x7f0000000180)={{0x0, 0x2710}}, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:34:34 executing program 5: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:34 executing program 3: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getegid() getegid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:34 executing program 2: lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x15, 0x0, 0x0, "566be62a8cdc3d8c27656b1bfde02667"}, 0x15, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:34 executing program 1: memfd_create(&(0x7f0000000000)='em0trusted\x00', 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x5, 0x0, 0x0, 0x20000000000001}, 0x2c) 03:34:34 executing program 1: memfd_create(&(0x7f0000000000)='em0trusted\x00', 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x5, 0x0, 0x0, 0x20000000000001}, 0x2c) 03:34:34 executing program 0: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, 0xe8) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) getuid() setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000c00), 0x14) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000040)='keyring\x00', &(0x7f0000000000), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000180)) 03:34:34 executing program 1: memfd_create(&(0x7f0000000000)='em0trusted\x00', 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x5, 0x0, 0x0, 0x20000000000001}, 0x2c) 03:34:34 executing program 1: memfd_create(&(0x7f0000000000)='em0trusted\x00', 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x5, 0x0, 0x0, 0x20000000000001}, 0x2c) 03:34:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in6=@remote}}, 0xe8) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) 03:34:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in6=@remote}}, 0xe8) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) 03:34:35 executing program 4: setitimer(0x0, &(0x7f0000000180)={{0x0, 0x2710}}, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:34:35 executing program 5: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in6=@remote}}, 0xe8) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) 03:34:35 executing program 3: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getegid() getegid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:35 executing program 2: lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x15, 0x0, 0x0, "566be62a8cdc3d8c27656b1bfde02667"}, 0x15, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in6=@remote}}, 0xe8) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) 03:34:35 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x20004e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) shutdown(r1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 03:34:35 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000100007031dfffd946fa2830020200a0009000300001d12cfbd27c3a3624eff7e28000000020a43ba5d80601b9a51f400003288d94b234f31d78900060000000029ec2400020cd37e", 0x4c}], 0x1}, 0x0) 03:34:35 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x20004e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) shutdown(r1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) [ 1198.719731] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1198.763249] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 03:34:35 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000100007031dfffd946fa2830020200a0009000300001d12cfbd27c3a3624eff7e28000000020a43ba5d80601b9a51f400003288d94b234f31d78900060000000029ec2400020cd37e", 0x4c}], 0x1}, 0x0) 03:34:35 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x20004e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) shutdown(r1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) [ 1198.967040] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1198.995552] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 03:34:35 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x20004e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) shutdown(r1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 03:34:35 executing program 4: setitimer(0x0, &(0x7f0000000180)={{0x0, 0x2710}}, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:34:36 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000100007031dfffd946fa2830020200a0009000300001d12cfbd27c3a3624eff7e28000000020a43ba5d80601b9a51f400003288d94b234f31d78900060000000029ec2400020cd37e", 0x4c}], 0x1}, 0x0) 03:34:36 executing program 0: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000440), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clock_gettime(0x0, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000008c0)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) syz_execute_func(&(0x7f0000000480)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) getgroups(0x0, &(0x7f00000003c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@local, @in6=@ipv4}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000400)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000980)={0xa7, 0x7d, 0x0, {{0x0, 0x6b, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x12, '/dev/loop-control\x00', 0x12, '/dev/loop-control\x00', 0x12, '/dev/loop-control\x00', 0x2, '^,'}, 0x27, 'ppp1.ppp0)nodevppp0lo)systemselfvmnet1}'}}, 0xa7) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:34:36 executing program 5: r0 = socket$unix(0x1, 0x1004000000000002, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000080)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) [ 1199.308506] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1199.342836] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 03:34:36 executing program 3: prctl$setname(0x24, &(0x7f0000000040)="07c95000f0a885a7f51d418d0bc9000000f1ff0000") socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000780)=ANY=[], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac465400f626047410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe9098f2ab7f") 03:34:36 executing program 2: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000000340)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) accept(0xffffffffffffffff, &(0x7f00000007c0)=@generic, &(0x7f0000000540)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:36 executing program 5: r0 = socket$unix(0x1, 0x1004000000000002, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000080)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) 03:34:36 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000100007031dfffd946fa2830020200a0009000300001d12cfbd27c3a3624eff7e28000000020a43ba5d80601b9a51f400003288d94b234f31d78900060000000029ec2400020cd37e", 0x4c}], 0x1}, 0x0) 03:34:36 executing program 5: r0 = socket$unix(0x1, 0x1004000000000002, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000080)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) [ 1199.547108] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1199.560808] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 03:34:36 executing program 0: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000440), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clock_gettime(0x0, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000008c0)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) syz_execute_func(&(0x7f0000000480)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) getgroups(0x0, &(0x7f00000003c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@local, @in6=@ipv4}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000400)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000980)={0xa7, 0x7d, 0x0, {{0x0, 0x6b, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x12, '/dev/loop-control\x00', 0x12, '/dev/loop-control\x00', 0x12, '/dev/loop-control\x00', 0x2, '^,'}, 0x27, 'ppp1.ppp0)nodevppp0lo)systemselfvmnet1}'}}, 0xa7) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:34:36 executing program 5: r0 = socket$unix(0x1, 0x1004000000000002, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000080)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) 03:34:36 executing program 1: r0 = socket$unix(0x1, 0x1004000000000002, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000080)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) 03:34:36 executing program 0: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000440), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clock_gettime(0x0, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000008c0)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) syz_execute_func(&(0x7f0000000480)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) getgroups(0x0, &(0x7f00000003c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@local, @in6=@ipv4}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000400)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000980)={0xa7, 0x7d, 0x0, {{0x0, 0x6b, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x12, '/dev/loop-control\x00', 0x12, '/dev/loop-control\x00', 0x12, '/dev/loop-control\x00', 0x2, '^,'}, 0x27, 'ppp1.ppp0)nodevppp0lo)systemselfvmnet1}'}}, 0xa7) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:34:36 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x81, 0x80000001, 0x0, 0x81}, &(0x7f0000000180)={0xe00000000000, 0x0, 0x0, 0x100000000, 0x7, 0x6, 0x101}, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0x0, 0x4, 0x800, 0x4, 0x9}, &(0x7f0000000200)={0x0, 0x2710}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xa4, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 03:34:36 executing program 1: r0 = socket$unix(0x1, 0x1004000000000002, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000080)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) 03:34:36 executing program 5: getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000300)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000200)) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000004c0)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000240), 0x4) syz_execute_func(&(0x7f0000000180)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@local}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000980)={@local}, &(0x7f00000009c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00)={@empty, @remote}, &(0x7f0000000a40)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a80), &(0x7f0000000ac0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000b40)={'eql\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000000c80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @remote, @rand_addr}, &(0x7f0000000d00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@remote, @in=@local}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000e40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f00)={{{@in, @in=@loopback}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000001000)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001100)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005a40)={0x0, @rand_addr, @multicast2}, &(0x7f0000005a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005ac0)={0x0, @empty, @multicast2}, &(0x7f0000005b00)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000005b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000005bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005c00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005f40)={{{@in, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000006040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006080)={0x0, @multicast2, @remote}, &(0x7f00000060c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) 03:34:37 executing program 3: prctl$setname(0x24, &(0x7f0000000040)="07c95000f0a885a7f51d418d0bc9000000f1ff0000") socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000780)=ANY=[], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac465400f626047410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe9098f2ab7f") 03:34:37 executing program 1: r0 = socket$unix(0x1, 0x1004000000000002, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000080)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) 03:34:37 executing program 0: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000440), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clock_gettime(0x0, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000008c0)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) syz_execute_func(&(0x7f0000000480)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) getgroups(0x0, &(0x7f00000003c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@local, @in6=@ipv4}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000400)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000980)={0xa7, 0x7d, 0x0, {{0x0, 0x6b, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x12, '/dev/loop-control\x00', 0x12, '/dev/loop-control\x00', 0x12, '/dev/loop-control\x00', 0x2, '^,'}, 0x27, 'ppp1.ppp0)nodevppp0lo)systemselfvmnet1}'}}, 0xa7) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:34:37 executing program 2: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000000340)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) accept(0xffffffffffffffff, &(0x7f00000007c0)=@generic, &(0x7f0000000540)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:37 executing program 1: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000000340)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) accept(0xffffffffffffffff, &(0x7f00000007c0)=@generic, &(0x7f0000000540)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) syz_open_dev$sndpcmp(&(0x7f0000001440)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000002c7, 0x0) 03:34:37 executing program 5: getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000300)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000200)) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000004c0)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000240), 0x4) syz_execute_func(&(0x7f0000000180)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@local}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000980)={@local}, &(0x7f00000009c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00)={@empty, @remote}, &(0x7f0000000a40)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a80), &(0x7f0000000ac0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000b40)={'eql\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000000c80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @remote, @rand_addr}, &(0x7f0000000d00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@remote, @in=@local}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000e40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f00)={{{@in, @in=@loopback}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000001000)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001100)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005a40)={0x0, @rand_addr, @multicast2}, &(0x7f0000005a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005ac0)={0x0, @empty, @multicast2}, &(0x7f0000005b00)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000005b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000005bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005c00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005f40)={{{@in, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000006040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006080)={0x0, @multicast2, @remote}, &(0x7f00000060c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) 03:34:38 executing program 2: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000000340)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) accept(0xffffffffffffffff, &(0x7f00000007c0)=@generic, &(0x7f0000000540)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:38 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x81, 0x80000001, 0x0, 0x81}, &(0x7f0000000180)={0xe00000000000, 0x0, 0x0, 0x100000000, 0x7, 0x6, 0x101}, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0x0, 0x4, 0x800, 0x4, 0x9}, &(0x7f0000000200)={0x0, 0x2710}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xa4, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 03:34:38 executing program 3: prctl$setname(0x24, &(0x7f0000000040)="07c95000f0a885a7f51d418d0bc9000000f1ff0000") socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000780)=ANY=[], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac465400f626047410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe9098f2ab7f") 03:34:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) syz_open_dev$sndpcmp(&(0x7f0000001440)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000002c7, 0x0) 03:34:38 executing program 1: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000000340)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) accept(0xffffffffffffffff, &(0x7f00000007c0)=@generic, &(0x7f0000000540)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) syz_open_dev$sndpcmp(&(0x7f0000001440)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000002c7, 0x0) 03:34:38 executing program 5: getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000300)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000200)) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000004c0)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000240), 0x4) syz_execute_func(&(0x7f0000000180)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@local}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000980)={@local}, &(0x7f00000009c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00)={@empty, @remote}, &(0x7f0000000a40)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a80), &(0x7f0000000ac0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000b40)={'eql\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000000c80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @remote, @rand_addr}, &(0x7f0000000d00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@remote, @in=@local}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000e40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f00)={{{@in, @in=@loopback}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000001000)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001100)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005a40)={0x0, @rand_addr, @multicast2}, &(0x7f0000005a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005ac0)={0x0, @empty, @multicast2}, &(0x7f0000005b00)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000005b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000005bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005c00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005f40)={{{@in, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000006040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006080)={0x0, @multicast2, @remote}, &(0x7f00000060c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) 03:34:38 executing program 2: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000000340)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) accept(0xffffffffffffffff, &(0x7f00000007c0)=@generic, &(0x7f0000000540)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:39 executing program 3: prctl$setname(0x24, &(0x7f0000000040)="07c95000f0a885a7f51d418d0bc9000000f1ff0000") socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000780)=ANY=[], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac465400f626047410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe9098f2ab7f") 03:34:39 executing program 1: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000000340)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) accept(0xffffffffffffffff, &(0x7f00000007c0)=@generic, &(0x7f0000000540)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:39 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x81, 0x80000001, 0x0, 0x81}, &(0x7f0000000180)={0xe00000000000, 0x0, 0x0, 0x100000000, 0x7, 0x6, 0x101}, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0x0, 0x4, 0x800, 0x4, 0x9}, &(0x7f0000000200)={0x0, 0x2710}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xa4, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 03:34:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) syz_open_dev$sndpcmp(&(0x7f0000001440)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000002c7, 0x0) 03:34:39 executing program 5: getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000300)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000200)) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000004c0)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000240), 0x4) syz_execute_func(&(0x7f0000000180)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@local}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000980)={@local}, &(0x7f00000009c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00)={@empty, @remote}, &(0x7f0000000a40)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a80), &(0x7f0000000ac0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000b40)={'eql\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000000c80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @remote, @rand_addr}, &(0x7f0000000d00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@remote, @in=@local}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000e40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f00)={{{@in, @in=@loopback}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000001000)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001100)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005a40)={0x0, @rand_addr, @multicast2}, &(0x7f0000005a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005ac0)={0x0, @empty, @multicast2}, &(0x7f0000005b00)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000005b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000005bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005c00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005f40)={{{@in, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000006040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006080)={0x0, @multicast2, @remote}, &(0x7f00000060c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) 03:34:39 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x81, 0x80000001, 0x0, 0x81}, &(0x7f0000000180)={0xe00000000000, 0x0, 0x0, 0x100000000, 0x7, 0x6, 0x101}, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0x0, 0x4, 0x800, 0x4, 0x9}, &(0x7f0000000200)={0x0, 0x2710}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xa4, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 03:34:40 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x81, 0x80000001, 0x0, 0x81}, &(0x7f0000000180)={0xe00000000000, 0x0, 0x0, 0x100000000, 0x7, 0x6, 0x101}, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0x0, 0x4, 0x800, 0x4, 0x9}, &(0x7f0000000200)={0x0, 0x2710}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xa4, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 03:34:40 executing program 1: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000040)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:34:40 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x81, 0x80000001, 0x0, 0x81}, &(0x7f0000000180)={0xe00000000000, 0x0, 0x0, 0x100000000, 0x7, 0x6, 0x101}, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0x0, 0x4, 0x800, 0x4, 0x9}, &(0x7f0000000200)={0x0, 0x2710}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xa4, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 03:34:40 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x81, 0x80000001, 0x0, 0x81}, &(0x7f0000000180)={0xe00000000000, 0x0, 0x0, 0x100000000, 0x7, 0x6, 0x101}, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0x0, 0x4, 0x800, 0x4, 0x9}, &(0x7f0000000200)={0x0, 0x2710}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xa4, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 03:34:40 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x81, 0x80000001, 0x0, 0x81}, &(0x7f0000000180)={0xe00000000000, 0x0, 0x0, 0x100000000, 0x7, 0x6, 0x101}, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0x0, 0x4, 0x800, 0x4, 0x9}, &(0x7f0000000200)={0x0, 0x2710}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xa4, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 03:34:40 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x81, 0x80000001, 0x0, 0x81}, &(0x7f0000000180)={0xe00000000000, 0x0, 0x0, 0x100000000, 0x7, 0x6, 0x101}, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0x0, 0x4, 0x800, 0x4, 0x9}, &(0x7f0000000200)={0x0, 0x2710}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xa4, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 03:34:40 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1ff, 0x1, &(0x7f0000001500)=[{&(0x7f0000000380)}], 0x0, &(0x7f0000001680)={[{@grpquota='grpquota'}]}) mount(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000003c0)={0xa, 0x1, "0109"}, 0x0) 03:34:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="ff65a7fa", 0x4}], 0x1, &(0x7f0000000040)}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 03:34:40 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1ff, 0x1, &(0x7f0000001500)=[{&(0x7f0000000380)}], 0x0, &(0x7f0000001680)={[{@grpquota='grpquota'}]}) mount(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000003c0)={0xa, 0x1, "0109"}, 0x0) 03:34:41 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x81, 0x80000001, 0x0, 0x81}, &(0x7f0000000180)={0xe00000000000, 0x0, 0x0, 0x100000000, 0x7, 0x6, 0x101}, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0x0, 0x4, 0x800, 0x4, 0x9}, &(0x7f0000000200)={0x0, 0x2710}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xa4, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 03:34:41 executing program 1: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000040)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:34:41 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1ff, 0x1, &(0x7f0000001500)=[{&(0x7f0000000380)}], 0x0, &(0x7f0000001680)={[{@grpquota='grpquota'}]}) mount(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000003c0)={0xa, 0x1, "0109"}, 0x0) 03:34:41 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x81, 0x80000001, 0x0, 0x81}, &(0x7f0000000180)={0xe00000000000, 0x0, 0x0, 0x100000000, 0x7, 0x6, 0x101}, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0x0, 0x4, 0x800, 0x4, 0x9}, &(0x7f0000000200)={0x0, 0x2710}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xa4, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 03:34:41 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="ff65a7fa", 0x4}], 0x1, &(0x7f0000000040)}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 03:34:41 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x81, 0x80000001, 0x0, 0x81}, &(0x7f0000000180)={0xe00000000000, 0x0, 0x0, 0x100000000, 0x7, 0x6, 0x101}, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0x0, 0x4, 0x800, 0x4, 0x9}, &(0x7f0000000200)={0x0, 0x2710}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xa4, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 03:34:41 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1ff, 0x1, &(0x7f0000001500)=[{&(0x7f0000000380)}], 0x0, &(0x7f0000001680)={[{@grpquota='grpquota'}]}) mount(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000003c0)={0xa, 0x1, "0109"}, 0x0) 03:34:41 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000240)={0xaa, 0x17}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00002d3000/0x4000)=nil, 0x4000}}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x7c, 0x100000000, 0x0, {0x0, 0x989680}, 0x59ee, 0x1000000000}) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000280), &(0x7f00000002c0)=0x8) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) sendfile(r0, r3, 0x0, 0x8c) mincore(&(0x7f00000be000/0x4000)=nil, 0x4000, &(0x7f0000000040)=""/29) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 03:34:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="ff65a7fa", 0x4}], 0x1, &(0x7f0000000040)}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 03:34:42 executing program 1: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000040)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:34:42 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x81, 0x80000001, 0x0, 0x81}, &(0x7f0000000180)={0xe00000000000, 0x0, 0x0, 0x100000000, 0x7, 0x6, 0x101}, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0x0, 0x4, 0x800, 0x4, 0x9}, &(0x7f0000000200)={0x0, 0x2710}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xa4, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 03:34:42 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:42 executing program 1: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000040)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:34:42 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) sched_yield() syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) syz_execute_func(&(0x7f0000000a00)="428055a0596969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 03:34:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="ff65a7fa", 0x4}], 0x1, &(0x7f0000000040)}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 03:34:42 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000240)={0xaa, 0x17}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00002d3000/0x4000)=nil, 0x4000}}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x7c, 0x100000000, 0x0, {0x0, 0x989680}, 0x59ee, 0x1000000000}) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000280), &(0x7f00000002c0)=0x8) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) sendfile(r0, r3, 0x0, 0x8c) mincore(&(0x7f00000be000/0x4000)=nil, 0x4000, &(0x7f0000000040)=""/29) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 03:34:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000240)={0xaa, 0x17}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00002d3000/0x4000)=nil, 0x4000}}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x7c, 0x100000000, 0x0, {0x0, 0x989680}, 0x59ee, 0x1000000000}) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000280), &(0x7f00000002c0)=0x8) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) sendfile(r0, r3, 0x0, 0x8c) mincore(&(0x7f00000be000/0x4000)=nil, 0x4000, &(0x7f0000000040)=""/29) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 03:34:43 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000240)={0xaa, 0x17}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00002d3000/0x4000)=nil, 0x4000}}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x7c, 0x100000000, 0x0, {0x0, 0x989680}, 0x59ee, 0x1000000000}) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000280), &(0x7f00000002c0)=0x8) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) sendfile(r0, r3, 0x0, 0x8c) mincore(&(0x7f00000be000/0x4000)=nil, 0x4000, &(0x7f0000000040)=""/29) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 03:34:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000240)={0xaa, 0x17}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00002d3000/0x4000)=nil, 0x4000}}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x7c, 0x100000000, 0x0, {0x0, 0x989680}, 0x59ee, 0x1000000000}) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000280), &(0x7f00000002c0)=0x8) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) sendfile(r0, r3, 0x0, 0x8c) mincore(&(0x7f00000be000/0x4000)=nil, 0x4000, &(0x7f0000000040)=""/29) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 03:34:43 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) sched_yield() syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) syz_execute_func(&(0x7f0000000a00)="428055a0596969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 03:34:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x40000, 0xfff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fallocate(r0, 0x0, 0xfd90, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 03:34:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000240)={0xaa, 0x17}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00002d3000/0x4000)=nil, 0x4000}}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x7c, 0x100000000, 0x0, {0x0, 0x989680}, 0x59ee, 0x1000000000}) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000280), &(0x7f00000002c0)=0x8) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) sendfile(r0, r3, 0x0, 0x8c) mincore(&(0x7f00000be000/0x4000)=nil, 0x4000, &(0x7f0000000040)=""/29) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 03:34:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x40000, 0xfff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fallocate(r0, 0x0, 0xfd90, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 03:34:44 executing program 1: shmget(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) add_key(&(0x7f0000000480)='asymmetric\x00', &(0x7f00000004c0), &(0x7f00000008c0), 0x0, 0x0) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0x0) request_key(&(0x7f0000000440)="775322b46b6c69737400", &(0x7f0000000840), &(0x7f0000000880)='team0\x00', 0xfffffffffffffffa) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000340)={0x30}, 0x30) keyctl$unlink(0x9, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) dup(0xffffffffffffff9c) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f00000001c0)=""/70) syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) getresgid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000540)) setresgid(0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) memfd_create(&(0x7f00000005c0)="3a70707030892900", 0x0) fstat(0xffffffffffffffff, &(0x7f0000000680)) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000600)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000640)='team0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) syz_execute_func(&(0x7f0000000700)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") 03:34:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x40000, 0xfff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fallocate(r0, 0x0, 0xfd90, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 03:34:44 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000240)={0xaa, 0x17}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00002d3000/0x4000)=nil, 0x4000}}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x7c, 0x100000000, 0x0, {0x0, 0x989680}, 0x59ee, 0x1000000000}) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000280), &(0x7f00000002c0)=0x8) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) sendfile(r0, r3, 0x0, 0x8c) mincore(&(0x7f00000be000/0x4000)=nil, 0x4000, &(0x7f0000000040)=""/29) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 03:34:44 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x40000, 0xfff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fallocate(r0, 0x0, 0xfd90, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 03:34:44 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) sched_yield() syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) syz_execute_func(&(0x7f0000000a00)="428055a0596969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 03:34:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000240)={0xaa, 0x17}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00002d3000/0x4000)=nil, 0x4000}}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x7c, 0x100000000, 0x0, {0x0, 0x989680}, 0x59ee, 0x1000000000}) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000280), &(0x7f00000002c0)=0x8) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) sendfile(r0, r3, 0x0, 0x8c) mincore(&(0x7f00000be000/0x4000)=nil, 0x4000, &(0x7f0000000040)=""/29) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 03:34:44 executing program 0: syz_emit_ethernet(0x7e, &(0x7f0000000840)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "892b50", 0x48, 0x0, 0x0, @empty, @ipv4={[], [], @multicast2}, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @padn={0x1, 0x2, [0x0, 0x0]}]}], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "d4b138", 0x0, 0x0, 0x0, @empty, @ipv4={[], [], @multicast2}}}}}}}}, 0x0) 03:34:45 executing program 0: syz_emit_ethernet(0x7e, &(0x7f0000000840)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "892b50", 0x48, 0x0, 0x0, @empty, @ipv4={[], [], @multicast2}, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @padn={0x1, 0x2, [0x0, 0x0]}]}], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "d4b138", 0x0, 0x0, 0x0, @empty, @ipv4={[], [], @multicast2}}}}}}}}, 0x0) 03:34:45 executing program 1: shmget(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) add_key(&(0x7f0000000480)='asymmetric\x00', &(0x7f00000004c0), &(0x7f00000008c0), 0x0, 0x0) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0x0) request_key(&(0x7f0000000440)="775322b46b6c69737400", &(0x7f0000000840), &(0x7f0000000880)='team0\x00', 0xfffffffffffffffa) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000340)={0x30}, 0x30) keyctl$unlink(0x9, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) dup(0xffffffffffffff9c) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f00000001c0)=""/70) syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) getresgid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000540)) setresgid(0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) memfd_create(&(0x7f00000005c0)="3a70707030892900", 0x0) fstat(0xffffffffffffffff, &(0x7f0000000680)) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000600)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000640)='team0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) syz_execute_func(&(0x7f0000000700)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") 03:34:45 executing program 0: syz_emit_ethernet(0x7e, &(0x7f0000000840)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "892b50", 0x48, 0x0, 0x0, @empty, @ipv4={[], [], @multicast2}, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @padn={0x1, 0x2, [0x0, 0x0]}]}], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "d4b138", 0x0, 0x0, 0x0, @empty, @ipv4={[], [], @multicast2}}}}}}}}, 0x0) 03:34:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000), 0x0) 03:34:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000240)={0xaa, 0x17}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00002d3000/0x4000)=nil, 0x4000}}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x7c, 0x100000000, 0x0, {0x0, 0x989680}, 0x59ee, 0x1000000000}) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000280), &(0x7f00000002c0)=0x8) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) sendfile(r0, r3, 0x0, 0x8c) mincore(&(0x7f00000be000/0x4000)=nil, 0x4000, &(0x7f0000000040)=""/29) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 03:34:45 executing program 0: syz_emit_ethernet(0x7e, &(0x7f0000000840)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "892b50", 0x48, 0x0, 0x0, @empty, @ipv4={[], [], @multicast2}, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @padn={0x1, 0x2, [0x0, 0x0]}]}], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "d4b138", 0x0, 0x0, 0x0, @empty, @ipv4={[], [], @multicast2}}}}}}}}, 0x0) 03:34:45 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) sched_yield() syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) syz_execute_func(&(0x7f0000000a00)="428055a0596969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 03:34:45 executing program 0: futex(&(0x7f0000000280), 0x4, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xfffffffffffffe00) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001500)) getuid() getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000), 0x0) 03:34:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000), 0x0) 03:34:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000240)={0xaa, 0x17}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00002d3000/0x4000)=nil, 0x4000}}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x7c, 0x100000000, 0x0, {0x0, 0x989680}, 0x59ee, 0x1000000000}) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000280), &(0x7f00000002c0)=0x8) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) sendfile(r0, r3, 0x0, 0x8c) mincore(&(0x7f00000be000/0x4000)=nil, 0x4000, &(0x7f0000000040)=""/29) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 03:34:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000), 0x0) 03:34:46 executing program 1: shmget(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) add_key(&(0x7f0000000480)='asymmetric\x00', &(0x7f00000004c0), &(0x7f00000008c0), 0x0, 0x0) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0x0) request_key(&(0x7f0000000440)="775322b46b6c69737400", &(0x7f0000000840), &(0x7f0000000880)='team0\x00', 0xfffffffffffffffa) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000340)={0x30}, 0x30) keyctl$unlink(0x9, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) dup(0xffffffffffffff9c) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f00000001c0)=""/70) syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) getresgid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000540)) setresgid(0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) memfd_create(&(0x7f00000005c0)="3a70707030892900", 0x0) fstat(0xffffffffffffffff, &(0x7f0000000680)) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000600)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000640)='team0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) syz_execute_func(&(0x7f0000000700)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") 03:34:46 executing program 4: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f00000001c0)={[{@uid={'uid'}}]}) mount(&(0x7f0000000280), &(0x7f0000000480)='./file0\x00', &(0x7f0000000380)='hugetlbfs\x00', 0x0, &(0x7f00000001c0)) 03:34:46 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000003c0)=0x19f) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000002c0)=r1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x17060000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffc3, 0xa00}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 03:34:46 executing program 0: futex(&(0x7f0000000280), 0x4, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xfffffffffffffe00) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001500)) getuid() getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") [ 1210.090487] ISOFS: Unable to identify CD-ROM format. 03:34:46 executing program 3: inotify_init1(0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da01245cf0f01eece73fe470f006f92380f8ac469df1af3f081768cc8000601c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541f20f38f01a0f2e1ad6fb0703") [ 1210.341596] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1210.353627] ISOFS: Unable to identify CD-ROM format. 03:34:47 executing program 4: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f00000001c0)={[{@uid={'uid'}}]}) mount(&(0x7f0000000280), &(0x7f0000000480)='./file0\x00', &(0x7f0000000380)='hugetlbfs\x00', 0x0, &(0x7f00000001c0)) 03:34:47 executing program 1: shmget(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) add_key(&(0x7f0000000480)='asymmetric\x00', &(0x7f00000004c0), &(0x7f00000008c0), 0x0, 0x0) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0x0) request_key(&(0x7f0000000440)="775322b46b6c69737400", &(0x7f0000000840), &(0x7f0000000880)='team0\x00', 0xfffffffffffffffa) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000340)={0x30}, 0x30) keyctl$unlink(0x9, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) dup(0xffffffffffffff9c) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f00000001c0)=""/70) syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) getresgid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000540)) setresgid(0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) memfd_create(&(0x7f00000005c0)="3a70707030892900", 0x0) fstat(0xffffffffffffffff, &(0x7f0000000680)) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000600)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000640)='team0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) syz_execute_func(&(0x7f0000000700)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") [ 1210.681818] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1210.683882] ISOFS: Unable to identify CD-ROM format. 03:34:47 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000003c0)=0x19f) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000002c0)=r1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x17060000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffc3, 0xa00}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 03:34:47 executing program 4: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f00000001c0)={[{@uid={'uid'}}]}) mount(&(0x7f0000000280), &(0x7f0000000480)='./file0\x00', &(0x7f0000000380)='hugetlbfs\x00', 0x0, &(0x7f00000001c0)) 03:34:47 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000003c0)=0x19f) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000002c0)=r1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x17060000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffc3, 0xa00}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) [ 1210.918729] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:47 executing program 0: futex(&(0x7f0000000280), 0x4, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xfffffffffffffe00) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001500)) getuid() getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:47 executing program 3: inotify_init1(0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da01245cf0f01eece73fe470f006f92380f8ac469df1af3f081768cc8000601c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541f20f38f01a0f2e1ad6fb0703") [ 1211.208950] ISOFS: Unable to identify CD-ROM format. 03:34:48 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000003c0)=0x19f) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000002c0)=r1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x17060000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffc3, 0xa00}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 03:34:48 executing program 4: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f00000001c0)={[{@uid={'uid'}}]}) mount(&(0x7f0000000280), &(0x7f0000000480)='./file0\x00', &(0x7f0000000380)='hugetlbfs\x00', 0x0, &(0x7f00000001c0)) [ 1211.342885] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1211.583796] ISOFS: Unable to identify CD-ROM format. 03:34:48 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f00000001c0)={[{@uid={'uid'}}]}) mount(&(0x7f0000000280), &(0x7f0000000480)='./file0\x00', &(0x7f0000000380)='hugetlbfs\x00', 0x0, &(0x7f00000001c0)) [ 1211.676062] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:48 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000003c0)=0x19f) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000002c0)=r1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x17060000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffc3, 0xa00}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 03:34:48 executing program 4: socket$inet6(0xa, 0x803, 0x6) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x0, 0x0, &(0x7f0000000cc0)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='ppp0vboxnet1.GPL@:bdevsecurity\x00', r2}, 0x10) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)=""/110, 0x6e) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r4, 0x80003) sendfile(r1, r4, &(0x7f00000000c0), 0x8000fffffffe) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000400)={0x8, 0x0, 0x3ff, 0x0, 0x0, 0x3}) write$FUSE_INIT(r3, &(0x7f0000000440)={0x50, 0xfffffffffffffff5, 0x3, {0x7, 0x1b, 0x0, 0xd1010, 0xfc82, 0x2, 0x0, 0x7ff}}, 0x50) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x31, 0x0, 0x7, 0xa, 0xb, 0x0, 0x4, 0x102}}) recvmmsg(r2, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) 03:34:48 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000003c0)=0x19f) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000002c0)=r1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x17060000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffc3, 0xa00}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) [ 1212.001295] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:48 executing program 0: futex(&(0x7f0000000280), 0x4, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xfffffffffffffe00) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001500)) getuid() getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:48 executing program 3: inotify_init1(0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da01245cf0f01eece73fe470f006f92380f8ac469df1af3f081768cc8000601c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541f20f38f01a0f2e1ad6fb0703") [ 1212.286606] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:49 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000003c0)=0x19f) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000002c0)=r1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x17060000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffc3, 0xa00}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 03:34:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x20000000c) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x113, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 1212.694260] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1212.706424] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x20000000c) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x113, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 03:34:49 executing program 4: socket$inet6(0xa, 0x803, 0x6) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x0, 0x0, &(0x7f0000000cc0)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='ppp0vboxnet1.GPL@:bdevsecurity\x00', r2}, 0x10) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)=""/110, 0x6e) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r4, 0x80003) sendfile(r1, r4, &(0x7f00000000c0), 0x8000fffffffe) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000400)={0x8, 0x0, 0x3ff, 0x0, 0x0, 0x3}) write$FUSE_INIT(r3, &(0x7f0000000440)={0x50, 0xfffffffffffffff5, 0x3, {0x7, 0x1b, 0x0, 0xd1010, 0xfc82, 0x2, 0x0, 0x7ff}}, 0x50) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x31, 0x0, 0x7, 0xa, 0xb, 0x0, 0x4, 0x102}}) recvmmsg(r2, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) 03:34:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x20000000c) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x113, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 1212.905699] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:34:49 executing program 0: socket$inet6(0xa, 0x803, 0x6) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x0, 0x0, &(0x7f0000000cc0)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='ppp0vboxnet1.GPL@:bdevsecurity\x00', r2}, 0x10) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)=""/110, 0x6e) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r4, 0x80003) sendfile(r1, r4, &(0x7f00000000c0), 0x8000fffffffe) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000400)={0x8, 0x0, 0x3ff, 0x0, 0x0, 0x3}) write$FUSE_INIT(r3, &(0x7f0000000440)={0x50, 0xfffffffffffffff5, 0x3, {0x7, 0x1b, 0x0, 0xd1010, 0xfc82, 0x2, 0x0, 0x7ff}}, 0x50) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x31, 0x0, 0x7, 0xa, 0xb, 0x0, 0x4, 0x102}}) recvmmsg(r2, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) [ 1213.006804] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:34:50 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f00000001c0)={[{@uid={'uid'}}]}) mount(&(0x7f0000000280), &(0x7f0000000480)='./file0\x00', &(0x7f0000000380)='hugetlbfs\x00', 0x0, &(0x7f00000001c0)) 03:34:50 executing program 0: socket$inet6(0xa, 0x803, 0x6) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x0, 0x0, &(0x7f0000000cc0)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='ppp0vboxnet1.GPL@:bdevsecurity\x00', r2}, 0x10) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)=""/110, 0x6e) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r4, 0x80003) sendfile(r1, r4, &(0x7f00000000c0), 0x8000fffffffe) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000400)={0x8, 0x0, 0x3ff, 0x0, 0x0, 0x3}) write$FUSE_INIT(r3, &(0x7f0000000440)={0x50, 0xfffffffffffffff5, 0x3, {0x7, 0x1b, 0x0, 0xd1010, 0xfc82, 0x2, 0x0, 0x7ff}}, 0x50) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x31, 0x0, 0x7, 0xa, 0xb, 0x0, 0x4, 0x102}}) recvmmsg(r2, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) 03:34:50 executing program 3: inotify_init1(0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da01245cf0f01eece73fe470f006f92380f8ac469df1af3f081768cc8000601c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541f20f38f01a0f2e1ad6fb0703") 03:34:50 executing program 5: socket$inet6(0xa, 0x803, 0x6) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x0, 0x0, &(0x7f0000000cc0)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='ppp0vboxnet1.GPL@:bdevsecurity\x00', r2}, 0x10) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)=""/110, 0x6e) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r4, 0x80003) sendfile(r1, r4, &(0x7f00000000c0), 0x8000fffffffe) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000400)={0x8, 0x0, 0x3ff, 0x0, 0x0, 0x3}) write$FUSE_INIT(r3, &(0x7f0000000440)={0x50, 0xfffffffffffffff5, 0x3, {0x7, 0x1b, 0x0, 0xd1010, 0xfc82, 0x2, 0x0, 0x7ff}}, 0x50) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x31, 0x0, 0x7, 0xa, 0xb, 0x0, 0x4, 0x102}}) recvmmsg(r2, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) 03:34:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x20000000c) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x113, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 03:34:50 executing program 4: socket$inet6(0xa, 0x803, 0x6) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x0, 0x0, &(0x7f0000000cc0)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='ppp0vboxnet1.GPL@:bdevsecurity\x00', r2}, 0x10) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)=""/110, 0x6e) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r4, 0x80003) sendfile(r1, r4, &(0x7f00000000c0), 0x8000fffffffe) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000400)={0x8, 0x0, 0x3ff, 0x0, 0x0, 0x3}) write$FUSE_INIT(r3, &(0x7f0000000440)={0x50, 0xfffffffffffffff5, 0x3, {0x7, 0x1b, 0x0, 0xd1010, 0xfc82, 0x2, 0x0, 0x7ff}}, 0x50) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x31, 0x0, 0x7, 0xa, 0xb, 0x0, 0x4, 0x102}}) recvmmsg(r2, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) [ 1213.643111] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:34:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x20000000c) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x113, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 1213.966934] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1214.077279] IPVS: ftp: loaded support on port[0] = 21 03:34:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x20000000c) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x113, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 03:34:50 executing program 5: socket$inet6(0xa, 0x803, 0x6) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x0, 0x0, &(0x7f0000000cc0)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='ppp0vboxnet1.GPL@:bdevsecurity\x00', r2}, 0x10) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)=""/110, 0x6e) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r4, 0x80003) sendfile(r1, r4, &(0x7f00000000c0), 0x8000fffffffe) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000400)={0x8, 0x0, 0x3ff, 0x0, 0x0, 0x3}) write$FUSE_INIT(r3, &(0x7f0000000440)={0x50, 0xfffffffffffffff5, 0x3, {0x7, 0x1b, 0x0, 0xd1010, 0xfc82, 0x2, 0x0, 0x7ff}}, 0x50) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x31, 0x0, 0x7, 0xa, 0xb, 0x0, 0x4, 0x102}}) recvmmsg(r2, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) 03:34:51 executing program 0: socket$inet6(0xa, 0x803, 0x6) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x0, 0x0, &(0x7f0000000cc0)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='ppp0vboxnet1.GPL@:bdevsecurity\x00', r2}, 0x10) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)=""/110, 0x6e) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r4, 0x80003) sendfile(r1, r4, &(0x7f00000000c0), 0x8000fffffffe) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000400)={0x8, 0x0, 0x3ff, 0x0, 0x0, 0x3}) write$FUSE_INIT(r3, &(0x7f0000000440)={0x50, 0xfffffffffffffff5, 0x3, {0x7, 0x1b, 0x0, 0xd1010, 0xfc82, 0x2, 0x0, 0x7ff}}, 0x50) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x31, 0x0, 0x7, 0xa, 0xb, 0x0, 0x4, 0x102}}) recvmmsg(r2, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) [ 1214.236518] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:34:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x20000000c) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x113, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 03:34:51 executing program 4: socket$inet6(0xa, 0x803, 0x6) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x0, 0x0, &(0x7f0000000cc0)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='ppp0vboxnet1.GPL@:bdevsecurity\x00', r2}, 0x10) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)=""/110, 0x6e) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r4, 0x80003) sendfile(r1, r4, &(0x7f00000000c0), 0x8000fffffffe) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000400)={0x8, 0x0, 0x3ff, 0x0, 0x0, 0x3}) write$FUSE_INIT(r3, &(0x7f0000000440)={0x50, 0xfffffffffffffff5, 0x3, {0x7, 0x1b, 0x0, 0xd1010, 0xfc82, 0x2, 0x0, 0x7ff}}, 0x50) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x31, 0x0, 0x7, 0xa, 0xb, 0x0, 0x4, 0x102}}) recvmmsg(r2, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) [ 1214.423548] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1216.024000] bridge0: port 1(bridge_slave_0) entered blocking state [ 1216.030405] bridge0: port 1(bridge_slave_0) entered disabled state [ 1216.038207] device bridge_slave_0 entered promiscuous mode [ 1216.172655] bridge0: port 2(bridge_slave_1) entered blocking state [ 1216.179072] bridge0: port 2(bridge_slave_1) entered disabled state [ 1216.186481] device bridge_slave_1 entered promiscuous mode [ 1216.323309] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1216.351082] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1216.444338] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1216.478008] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1216.704747] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1216.712295] team0: Port device team_slave_0 added [ 1216.776230] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1216.783485] team0: Port device team_slave_1 added [ 1216.808712] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1216.816109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1216.824588] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1216.884914] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1216.891997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1216.900947] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1216.974839] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1216.982036] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1216.990437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1217.054728] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1217.061954] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1217.070923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1217.213522] device bridge_slave_1 left promiscuous mode [ 1217.219045] bridge0: port 2(bridge_slave_1) entered disabled state [ 1217.271429] device bridge_slave_0 left promiscuous mode [ 1217.276877] bridge0: port 1(bridge_slave_0) entered disabled state [ 1219.409088] team0 (unregistering): Port device team_slave_1 removed [ 1219.419305] team0 (unregistering): Port device team_slave_0 removed [ 1219.429870] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1219.475916] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1219.530714] bond0 (unregistering): Released all slaves [ 1219.840494] bridge0: port 2(bridge_slave_1) entered blocking state [ 1219.846936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1219.853666] bridge0: port 1(bridge_slave_0) entered blocking state [ 1219.860039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1219.867875] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1220.661205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1221.353905] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1221.465325] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1221.569849] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1221.576199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1221.584021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1221.669865] 8021q: adding VLAN 0 to HW filter on device team0 [ 1222.233211] ISOFS: Unable to identify CD-ROM format. 03:34:59 executing program 2: prctl$seccomp(0x2c, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000140), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) getpid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') 03:34:59 executing program 3: umount2(&(0x7f0000000ac0)='./file0\x00', 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000480)) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x3c619bad0cdbd852, &(0x7f0000000680)}) getrandom(&(0x7f00000004c0)=""/253, 0xcc, 0x0) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000006c0)) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000007c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000700), &(0x7f0000000840)=0x4) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000009c0), 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f00000009c0)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x108) 03:34:59 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f00000001c0)={[{@uid={'uid'}}]}) mount(&(0x7f0000000280), &(0x7f0000000480)='./file0\x00', &(0x7f0000000380)='hugetlbfs\x00', 0x0, &(0x7f00000001c0)) 03:34:59 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x0, 0x99, 0x0, 0xffffff80}, 0xc) 03:34:59 executing program 5: socket$inet6(0xa, 0x803, 0x6) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x0, 0x0, &(0x7f0000000cc0)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='ppp0vboxnet1.GPL@:bdevsecurity\x00', r2}, 0x10) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)=""/110, 0x6e) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r4, 0x80003) sendfile(r1, r4, &(0x7f00000000c0), 0x8000fffffffe) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000400)={0x8, 0x0, 0x3ff, 0x0, 0x0, 0x3}) write$FUSE_INIT(r3, &(0x7f0000000440)={0x50, 0xfffffffffffffff5, 0x3, {0x7, 0x1b, 0x0, 0xd1010, 0xfc82, 0x2, 0x0, 0x7ff}}, 0x50) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x31, 0x0, 0x7, 0xa, 0xb, 0x0, 0x4, 0x102}}) recvmmsg(r2, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) 03:34:59 executing program 0: pipe2(&(0x7f0000001300), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='/proc/self/net/pfkey\x00'}, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000280), &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000300), 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') socket$inet_tcp(0x2, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) geteuid() getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0), &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000002c0), 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={"626f6e645f736c6176655f30000e00", {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$inet(0xffffffffffffffff, &(0x7f0000dc9ff0)={0x2, 0x0, @rand_addr}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f00000012c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)) chdir(&(0x7f0000001340)='./bus\x00') syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x0, 0x0) 03:34:59 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x0, 0x99, 0x0, 0xffffff80}, 0xc) 03:34:59 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x0, 0x99, 0x0, 0xffffff80}, 0xc) [ 1222.548091] ISOFS: Unable to identify CD-ROM format. 03:34:59 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x0, 0x99, 0x0, 0xffffff80}, 0xc) 03:34:59 executing program 1: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:59 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@dev, @in6}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000800)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000008c0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@loopback, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000c00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000e80)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in=@remote, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000001500)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000001640)=0xe8) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001740), &(0x7f0000001780)=0x14) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'lo\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000cc0)=ANY=[]}}, 0x0) accept4(0xffffffffffffffff, &(0x7f0000001900)=@xdp, &(0x7f0000001980)=0x80, 0x0) 03:34:59 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_stats={0x2}}) close(r2) close(r0) 03:35:00 executing program 2: prctl$seccomp(0x2c, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000140), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) getpid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') 03:35:00 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_stats={0x2}}) close(r2) close(r0) 03:35:00 executing program 0: pipe2(&(0x7f0000001300), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='/proc/self/net/pfkey\x00'}, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000280), &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000300), 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') socket$inet_tcp(0x2, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) geteuid() getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0), &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000002c0), 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={"626f6e645f736c6176655f30000e00", {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$inet(0xffffffffffffffff, &(0x7f0000dc9ff0)={0x2, 0x0, @rand_addr}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f00000012c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)) chdir(&(0x7f0000001340)='./bus\x00') syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x0, 0x0) 03:35:00 executing program 3: umount2(&(0x7f0000000ac0)='./file0\x00', 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000480)) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x3c619bad0cdbd852, &(0x7f0000000680)}) getrandom(&(0x7f00000004c0)=""/253, 0xcc, 0x0) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000006c0)) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000007c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000700), &(0x7f0000000840)=0x4) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000009c0), 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f00000009c0)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x108) 03:35:00 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_stats={0x2}}) close(r2) close(r0) 03:35:00 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_stats={0x2}}) close(r2) close(r0) 03:35:00 executing program 1: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:00 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@dev, @in6}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000800)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000008c0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@loopback, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000c00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000e80)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in=@remote, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000001500)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000001640)=0xe8) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001740), &(0x7f0000001780)=0x14) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'lo\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000cc0)=ANY=[]}}, 0x0) accept4(0xffffffffffffffff, &(0x7f0000001900)=@xdp, &(0x7f0000001980)=0x80, 0x0) 03:35:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f2234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140), &(0x7f0000000180)="453c6686f60af724a7664e3820ab79cd721aa7c3c523", 0x16, 0xfffffffffffffffd) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x2e}, &(0x7f0000000100), 0x390, 0xfffffffffffffffb) 03:35:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f2234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140), &(0x7f0000000180)="453c6686f60af724a7664e3820ab79cd721aa7c3c523", 0x16, 0xfffffffffffffffd) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x2e}, &(0x7f0000000100), 0x390, 0xfffffffffffffffb) 03:35:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f2234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140), &(0x7f0000000180)="453c6686f60af724a7664e3820ab79cd721aa7c3c523", 0x16, 0xfffffffffffffffd) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x2e}, &(0x7f0000000100), 0x390, 0xfffffffffffffffb) 03:35:00 executing program 3: umount2(&(0x7f0000000ac0)='./file0\x00', 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000480)) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x3c619bad0cdbd852, &(0x7f0000000680)}) getrandom(&(0x7f00000004c0)=""/253, 0xcc, 0x0) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000006c0)) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000007c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000700), &(0x7f0000000840)=0x4) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000009c0), 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f00000009c0)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x108) 03:35:01 executing program 2: prctl$seccomp(0x2c, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000140), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) getpid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') 03:35:01 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f2234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140), &(0x7f0000000180)="453c6686f60af724a7664e3820ab79cd721aa7c3c523", 0x16, 0xfffffffffffffffd) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x2e}, &(0x7f0000000100), 0x390, 0xfffffffffffffffb) 03:35:01 executing program 0: pipe2(&(0x7f0000001300), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='/proc/self/net/pfkey\x00'}, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000280), &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000300), 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') socket$inet_tcp(0x2, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) geteuid() getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0), &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000002c0), 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={"626f6e645f736c6176655f30000e00", {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$inet(0xffffffffffffffff, &(0x7f0000dc9ff0)={0x2, 0x0, @rand_addr}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f00000012c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)) chdir(&(0x7f0000001340)='./bus\x00') syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x0, 0x0) 03:35:01 executing program 5: pipe(&(0x7f0000000040)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100, 0x279d}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 1224.449694] IPVS: ftp: loaded support on port[0] = 21 [ 1224.585410] cgroup: fork rejected by pids controller in /syz5 03:35:01 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@dev, @in6}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000800)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000008c0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@loopback, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000c00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000e80)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in=@remote, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000001500)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000001640)=0xe8) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001740), &(0x7f0000001780)=0x14) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'lo\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000cc0)=ANY=[]}}, 0x0) accept4(0xffffffffffffffff, &(0x7f0000001900)=@xdp, &(0x7f0000001980)=0x80, 0x0) 03:35:01 executing program 5: pipe(&(0x7f0000000040)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100, 0x279d}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 03:35:01 executing program 1: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:01 executing program 5: pipe(&(0x7f0000000040)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100, 0x279d}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 1225.034704] IPVS: ftp: loaded support on port[0] = 21 03:35:01 executing program 3: umount2(&(0x7f0000000ac0)='./file0\x00', 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000480)) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x3c619bad0cdbd852, &(0x7f0000000680)}) getrandom(&(0x7f00000004c0)=""/253, 0xcc, 0x0) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000006c0)) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000007c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000700), &(0x7f0000000840)=0x4) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000009c0), 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f00000009c0)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x108) 03:35:02 executing program 0: pipe2(&(0x7f0000001300), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='/proc/self/net/pfkey\x00'}, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000280), &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000300), 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') socket$inet_tcp(0x2, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) geteuid() getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0), &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000002c0), 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={"626f6e645f736c6176655f30000e00", {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$inet(0xffffffffffffffff, &(0x7f0000dc9ff0)={0x2, 0x0, @rand_addr}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f00000012c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)) chdir(&(0x7f0000001340)='./bus\x00') syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x0, 0x0) 03:35:02 executing program 2: prctl$seccomp(0x2c, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000140), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) getpid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') 03:35:02 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) 03:35:02 executing program 5: pipe(&(0x7f0000000040)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100, 0x279d}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 03:35:02 executing program 3: geteuid() setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000380), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) getpeername(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000080)=0xfffffc95) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) getgid() lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f00000006c0)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getgroups(0x0, &(0x7f0000000800)) geteuid() getgroups(0x0, &(0x7f0000000880)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000008c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000900)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6, @in6=@dev}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000d80)=0xe8) getresgid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000f80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001040)={{{@in, @in6=@ipv4}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000001140)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000001280)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:02 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@dev, @in6}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000800)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000008c0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@loopback, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000c00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000e80)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in=@remote, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000001500)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000001640)=0xe8) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001740), &(0x7f0000001780)=0x14) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'lo\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000cc0)=ANY=[]}}, 0x0) accept4(0xffffffffffffffff, &(0x7f0000001900)=@xdp, &(0x7f0000001980)=0x80, 0x0) [ 1225.740829] IPVS: ftp: loaded support on port[0] = 21 03:35:02 executing program 1: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:03 executing program 0: mknod(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getown(0xffffffffffffffff, 0x9) gettid() accept4(0xffffffffffffffff, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x80, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ptmx\x00', 0x0, 0x0) eventfd(0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000840)=0x14, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000880)) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000008c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000900)='/dev/null\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000a40)=0xe8) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:03 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000017c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@loopback, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000001900)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000001a80)=0xe8) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) pipe(&(0x7f0000001dc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003280)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000003380)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) geteuid() getgroups(0x0, &(0x7f0000003440)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003480)={{{@in6=@mcast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003580)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getegid() getpgrp(0x0) stat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) getresgid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003a40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003b00), &(0x7f0000003b40)=0xc) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c80), 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) syz_execute_func(&(0x7f00000000c0)="0fae5a00c4419f2a910000002165420f380018450f38054a468f6880a27700da0fc403f9c442f99953002e2ef30f536e10c442512d7c7f0fc403c95fc356") 03:35:03 executing program 5: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0xfffffeb9, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) memfd_create(&(0x7f0000000380)='/dev/full\x00', 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000040)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000680), &(0x7f0000000740)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f00000003c0)}) syz_execute_func(&(0x7f0000000500)="42805da0120fef69dc0f01ee6767f2470ff0ac0ed2b79b7d7173fec4e263f6b6a0210000380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca642e2667664b0f3a16af4f00000005450f0f4b0ea0c4427d18b4550300000065450f2e1ac4010d64ac1e5d31a3b712dbe271410f01f90723") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getpgrp(0xffffffffffffffff) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000004c0)={0x25, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7, 'filter\x00'}}, 0x25) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000900), 0x1ae5f1dddaa7cdee}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000006c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000580)) unlink(&(0x7f00000003c0)='./file1\x00') munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 03:35:03 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000017c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@loopback, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000001900)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000001a80)=0xe8) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) pipe(&(0x7f0000001dc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003280)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000003380)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) geteuid() getgroups(0x0, &(0x7f0000003440)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003480)={{{@in6=@mcast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003580)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getegid() getpgrp(0x0) stat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) getresgid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003a40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003b00), &(0x7f0000003b40)=0xc) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c80), 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) syz_execute_func(&(0x7f00000000c0)="0fae5a00c4419f2a910000002165420f380018450f38054a468f6880a27700da0fc403f9c442f99953002e2ef30f536e10c442512d7c7f0fc403c95fc356") 03:35:03 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000017c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@loopback, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000001900)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000001a80)=0xe8) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) pipe(&(0x7f0000001dc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003280)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000003380)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) geteuid() getgroups(0x0, &(0x7f0000003440)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003480)={{{@in6=@mcast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003580)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getegid() getpgrp(0x0) stat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) getresgid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003a40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003b00), &(0x7f0000003b40)=0xc) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c80), 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) syz_execute_func(&(0x7f00000000c0)="0fae5a00c4419f2a910000002165420f380018450f38054a468f6880a27700da0fc403f9c442f99953002e2ef30f536e10c442512d7c7f0fc403c95fc356") 03:35:03 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x10000000000}) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x1000000}) 03:35:03 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000017c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@loopback, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000001900)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000001a80)=0xe8) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) pipe(&(0x7f0000001dc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003280)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000003380)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) geteuid() getgroups(0x0, &(0x7f0000003440)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003480)={{{@in6=@mcast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003580)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getegid() getpgrp(0x0) stat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) getresgid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003a40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003b00), &(0x7f0000003b40)=0xc) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c80), 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) syz_execute_func(&(0x7f00000000c0)="0fae5a00c4419f2a910000002165420f380018450f38054a468f6880a27700da0fc403f9c442f99953002e2ef30f536e10c442512d7c7f0fc403c95fc356") 03:35:03 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x10000000000}) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x1000000}) 03:35:03 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000017c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@loopback, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000001900)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000001a80)=0xe8) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) pipe(&(0x7f0000001dc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003280)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000003380)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) geteuid() getgroups(0x0, &(0x7f0000003440)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003480)={{{@in6=@mcast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003580)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getegid() getpgrp(0x0) stat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) getresgid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003a40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003b00), &(0x7f0000003b40)=0xc) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c80), 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) syz_execute_func(&(0x7f00000000c0)="0fae5a00c4419f2a910000002165420f380018450f38054a468f6880a27700da0fc403f9c442f99953002e2ef30f536e10c442512d7c7f0fc403c95fc356") 03:35:03 executing program 3: geteuid() setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000380), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) getpeername(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000080)=0xfffffc95) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) getgid() lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f00000006c0)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getgroups(0x0, &(0x7f0000000800)) geteuid() getgroups(0x0, &(0x7f0000000880)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000008c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000900)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6, @in6=@dev}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000d80)=0xe8) getresgid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000f80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001040)={{{@in, @in6=@ipv4}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000001140)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000001280)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:03 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000017c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@loopback, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000001900)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000001a80)=0xe8) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) pipe(&(0x7f0000001dc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003280)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000003380)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) geteuid() getgroups(0x0, &(0x7f0000003440)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003480)={{{@in6=@mcast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003580)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getegid() getpgrp(0x0) stat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) getresgid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003a40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003b00), &(0x7f0000003b40)=0xc) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c80), 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) syz_execute_func(&(0x7f00000000c0)="0fae5a00c4419f2a910000002165420f380018450f38054a468f6880a27700da0fc403f9c442f99953002e2ef30f536e10c442512d7c7f0fc403c95fc356") 03:35:04 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x10000000000}) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x1000000}) 03:35:04 executing program 0: mknod(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getown(0xffffffffffffffff, 0x9) gettid() accept4(0xffffffffffffffff, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x80, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ptmx\x00', 0x0, 0x0) eventfd(0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000840)=0x14, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000880)) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000008c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000900)='/dev/null\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000a40)=0xe8) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:04 executing program 5: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0xfffffeb9, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) memfd_create(&(0x7f0000000380)='/dev/full\x00', 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000040)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000680), &(0x7f0000000740)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f00000003c0)}) syz_execute_func(&(0x7f0000000500)="42805da0120fef69dc0f01ee6767f2470ff0ac0ed2b79b7d7173fec4e263f6b6a0210000380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca642e2667664b0f3a16af4f00000005450f0f4b0ea0c4427d18b4550300000065450f2e1ac4010d64ac1e5d31a3b712dbe271410f01f90723") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getpgrp(0xffffffffffffffff) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000004c0)={0x25, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7, 'filter\x00'}}, 0x25) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000900), 0x1ae5f1dddaa7cdee}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000006c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000580)) unlink(&(0x7f00000003c0)='./file1\x00') munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 03:35:04 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x10000000000}) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x1000000}) 03:35:04 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000017c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@loopback, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000001900)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000001a80)=0xe8) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) pipe(&(0x7f0000001dc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003280)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000003380)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) geteuid() getgroups(0x0, &(0x7f0000003440)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003480)={{{@in6=@mcast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003580)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getegid() getpgrp(0x0) stat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) getresgid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003a40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003b00), &(0x7f0000003b40)=0xc) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c80), 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) syz_execute_func(&(0x7f00000000c0)="0fae5a00c4419f2a910000002165420f380018450f38054a468f6880a27700da0fc403f9c442f99953002e2ef30f536e10c442512d7c7f0fc403c95fc356") 03:35:04 executing program 2: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000001c0)=@req3={0xe1f, 0x0, 0x3}, 0x9ed27b770768daeb) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 03:35:04 executing program 4: mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) eventfd2(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") [ 1227.659702] ================================================================== [ 1227.667408] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0 [ 1227.673400] Read of size 8 at addr ffff8801c6154a30 by task syz-executor2/12980 [ 1227.680845] [ 1227.682496] CPU: 0 PID: 12980 Comm: syz-executor2 Not tainted 4.19.0-rc3+ #9 [ 1227.689690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1227.699050] Call Trace: [ 1227.701649] dump_stack+0x1c4/0x2b4 [ 1227.705284] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1227.710481] ? printk+0xa7/0xcf [ 1227.713764] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1227.718532] print_address_description.cold.8+0x9/0x1ff [ 1227.723913] kasan_report.cold.9+0x242/0x309 [ 1227.728324] ? sock_i_ino+0x94/0xa0 [ 1227.731955] __asan_report_load8_noabort+0x14/0x20 [ 1227.736900] sock_i_ino+0x94/0xa0 [ 1227.740457] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 1227.745137] ? tipc_diag_dump+0x30/0x30 [ 1227.749128] ? tipc_getname+0x7f0/0x7f0 [ 1227.753125] ? graph_lock+0x170/0x170 [ 1227.756989] ? __lock_sock+0x203/0x350 [ 1227.760898] ? find_held_lock+0x36/0x1c0 [ 1227.764980] ? mark_held_locks+0xc7/0x130 [ 1227.769154] ? __local_bh_enable_ip+0x160/0x260 [ 1227.773837] ? __local_bh_enable_ip+0x160/0x260 [ 1227.778512] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1227.783104] ? trace_hardirqs_on+0xbd/0x310 [ 1227.787436] ? lock_release+0x970/0x970 [ 1227.791877] ? lock_sock_nested+0xe2/0x120 [ 1227.796120] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1227.801140] ? skb_put+0x17b/0x1e0 [ 1227.804687] ? memset+0x31/0x40 [ 1227.807981] ? __nlmsg_put+0x14c/0x1b0 [ 1227.811886] __tipc_add_sock_diag+0x233/0x360 [ 1227.816398] tipc_nl_sk_walk+0x122/0x1d0 [ 1227.820467] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 1227.825759] tipc_diag_dump+0x24/0x30 [ 1227.829570] netlink_dump+0x519/0xd50 [ 1227.833390] ? netlink_broadcast+0x50/0x50 [ 1227.837646] __netlink_dump_start+0x4f1/0x6f0 [ 1227.842153] ? tipc_data_ready+0x3e0/0x3e0 [ 1227.846397] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 1227.851509] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 1227.856185] ? tipc_data_ready+0x3e0/0x3e0 [ 1227.860421] ? tipc_unregister_sysctl+0x20/0x20 [ 1227.865090] ? tipc_ioctl+0x3a0/0x3a0 [ 1227.868902] ? netlink_deliver_tap+0x355/0xf80 [ 1227.873560] sock_diag_rcv_msg+0x31d/0x410 [ 1227.877815] netlink_rcv_skb+0x172/0x440 [ 1227.881879] ? sock_diag_bind+0x80/0x80 [ 1227.885862] ? netlink_ack+0xb80/0xb80 [ 1227.889771] sock_diag_rcv+0x2a/0x40 [ 1227.893496] netlink_unicast+0x5a5/0x760 [ 1227.897577] ? netlink_attachskb+0x9a0/0x9a0 [ 1227.902004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1227.907554] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1227.912582] netlink_sendmsg+0xa18/0xfc0 [ 1227.916658] ? netlink_unicast+0x760/0x760 [ 1227.920910] ? smack_socket_sendmsg+0xb0/0x190 [ 1227.925504] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1227.931048] ? security_socket_sendmsg+0x94/0xc0 [ 1227.935813] ? netlink_unicast+0x760/0x760 [ 1227.940056] sock_sendmsg+0xd5/0x120 [ 1227.943781] ___sys_sendmsg+0x7fd/0x930 [ 1227.947771] ? __local_bh_enable_ip+0x160/0x260 [ 1227.952458] ? copy_msghdr_from_user+0x580/0x580 [ 1227.957220] ? kasan_check_write+0x14/0x20 [ 1227.961465] ? _raw_spin_unlock_bh+0x30/0x40 [ 1227.965884] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1227.971347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1227.976896] ? release_sock+0x1ec/0x2c0 [ 1227.980882] ? __fget_light+0x2e9/0x430 [ 1227.984866] ? fget_raw+0x20/0x20 [ 1227.988331] ? __release_sock+0x3a0/0x3a0 [ 1227.992483] ? tipc_nametbl_build_group+0x273/0x360 [ 1227.997513] ? tipc_setsockopt+0x726/0xd70 [ 1228.001759] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1228.007305] ? sockfd_lookup_light+0xc5/0x160 [ 1228.011814] __sys_sendmsg+0x11d/0x280 [ 1228.015711] ? __ia32_sys_shutdown+0x80/0x80 [ 1228.020126] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1228.025667] ? fput+0x130/0x1a0 [ 1228.028963] ? __x64_sys_futex+0x47f/0x6a0 [ 1228.033218] ? do_syscall_64+0x9a/0x820 [ 1228.037204] ? do_syscall_64+0x9a/0x820 [ 1228.041191] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1228.046657] __x64_sys_sendmsg+0x78/0xb0 [ 1228.050726] do_syscall_64+0x1b9/0x820 [ 1228.054622] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1228.060007] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1228.064948] ? trace_hardirqs_on_caller+0x310/0x310 [ 1228.069993] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1228.075014] ? recalc_sigpending_tsk+0x180/0x180 [ 1228.079780] ? kasan_check_write+0x14/0x20 [ 1228.084033] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1228.088893] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1228.094086] RIP: 0033:0x4572d9 [ 1228.097280] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1228.116189] RSP: 002b:00007f9258974c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1228.123913] RAX: ffffffffffffffda RBX: 00007f92589756d4 RCX: 00000000004572d9 [ 1228.131190] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 1228.138462] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1228.145730] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1228.153001] R13: 00000000004d4f40 R14: 00000000004c941e R15: 0000000000000000 [ 1228.160285] [ 1228.161909] Allocated by task 12980: [ 1228.165645] save_stack+0x43/0xd0 [ 1228.169104] kasan_kmalloc+0xc7/0xe0 [ 1228.172821] kasan_slab_alloc+0x12/0x20 [ 1228.176797] kmem_cache_alloc+0x12e/0x730 [ 1228.180952] sock_alloc_inode+0x1d/0x260 [ 1228.185025] alloc_inode+0x63/0x190 [ 1228.188656] new_inode_pseudo+0x71/0x1a0 [ 1228.192714] sock_alloc+0x41/0x270 [ 1228.196273] __sock_create+0x175/0x930 [ 1228.200168] __sys_socket+0x106/0x260 [ 1228.203979] __x64_sys_socket+0x73/0xb0 [ 1228.207958] do_syscall_64+0x1b9/0x820 [ 1228.211867] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1228.217055] [ 1228.218684] Freed by task 12979: [ 1228.222057] save_stack+0x43/0xd0 [ 1228.225514] __kasan_slab_free+0x102/0x150 [ 1228.229749] kasan_slab_free+0xe/0x10 [ 1228.233553] kmem_cache_free+0x83/0x290 [ 1228.237530] sock_destroy_inode+0x51/0x60 [ 1228.241681] destroy_inode+0x159/0x200 [ 1228.245569] evict+0x5e0/0x980 [ 1228.248763] iput+0x679/0xa90 [ 1228.251874] dentry_unlink_inode+0x461/0x5e0 [ 1228.256286] __dentry_kill+0x44c/0x7a0 [ 1228.260178] dentry_kill+0xc9/0x5a0 [ 1228.263803] dput.part.26+0x660/0x790 [ 1228.267603] dput+0x15/0x20 [ 1228.270538] __fput+0x4cf/0xa30 [ 1228.273818] ____fput+0x15/0x20 [ 1228.277107] task_work_run+0x1e8/0x2a0 [ 1228.281006] exit_to_usermode_loop+0x318/0x380 [ 1228.285591] do_syscall_64+0x6be/0x820 [ 1228.289485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1228.294667] [ 1228.296301] The buggy address belongs to the object at ffff8801c61549c0 [ 1228.296301] which belongs to the cache sock_inode_cache(97:syz2) of size 984 [ 1228.310189] The buggy address is located 112 bytes inside of [ 1228.310189] 984-byte region [ffff8801c61549c0, ffff8801c6154d98) [ 1228.322063] The buggy address belongs to the page: [ 1228.327002] page:ffffea0007185500 count:1 mapcount:0 mapping:ffff8801cbf0d680 index:0xffff8801c6154ffd [ 1228.336451] flags: 0x2fffc0000000100(slab) [ 1228.340696] raw: 02fffc0000000100 ffffea00070f2a48 ffffea0007189c08 ffff8801cbf0d680 [ 1228.348588] raw: ffff8801c6154ffd ffff8801c61540c0 0000000100000002 ffff8801bee140c0 [ 1228.356465] page dumped because: kasan: bad access detected [ 1228.362176] page->mem_cgroup:ffff8801bee140c0 [ 1228.366667] [ 1228.368291] Memory state around the buggy address: [ 1228.373227] ffff8801c6154900: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1228.380593] ffff8801c6154980: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 1228.387958] >ffff8801c6154a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1228.395326] ^ [ 1228.400267] ffff8801c6154a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1228.407632] ffff8801c6154b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1228.414996] ================================================================== [ 1228.422353] Disabling lock debugging due to kernel taint [ 1228.427903] Kernel panic - not syncing: panic_on_warn set ... [ 1228.427903] [ 1228.435280] CPU: 0 PID: 12980 Comm: syz-executor2 Tainted: G B 4.19.0-rc3+ #9 [ 1228.443857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1228.453210] Call Trace: [ 1228.455804] dump_stack+0x1c4/0x2b4 [ 1228.459437] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1228.464637] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1228.469398] panic+0x238/0x4e7 [ 1228.472593] ? add_taint.cold.5+0x16/0x16 [ 1228.476748] ? trace_hardirqs_on+0xb4/0x310 [ 1228.481070] ? trace_hardirqs_on+0xb4/0x310 [ 1228.485393] kasan_end_report+0x47/0x4f [ 1228.489387] kasan_report.cold.9+0x76/0x309 [ 1228.493706] ? sock_i_ino+0x94/0xa0 [ 1228.497337] __asan_report_load8_noabort+0x14/0x20 [ 1228.502268] sock_i_ino+0x94/0xa0 [ 1228.505721] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 1228.510392] ? tipc_diag_dump+0x30/0x30 [ 1228.514367] ? tipc_getname+0x7f0/0x7f0 [ 1228.518346] ? graph_lock+0x170/0x170 [ 1228.522145] ? __lock_sock+0x203/0x350 [ 1228.526036] ? find_held_lock+0x36/0x1c0 [ 1228.530096] ? mark_held_locks+0xc7/0x130 [ 1228.534249] ? __local_bh_enable_ip+0x160/0x260 [ 1228.538915] ? __local_bh_enable_ip+0x160/0x260 [ 1228.543582] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1228.548162] ? trace_hardirqs_on+0xbd/0x310 [ 1228.552480] ? lock_release+0x970/0x970 [ 1228.556456] ? lock_sock_nested+0xe2/0x120 [ 1228.560688] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1228.565701] ? skb_put+0x17b/0x1e0 [ 1228.569243] ? memset+0x31/0x40 [ 1228.572522] ? __nlmsg_put+0x14c/0x1b0 [ 1228.576412] __tipc_add_sock_diag+0x233/0x360 [ 1228.580909] tipc_nl_sk_walk+0x122/0x1d0 [ 1228.585749] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 1228.591027] tipc_diag_dump+0x24/0x30 [ 1228.594829] netlink_dump+0x519/0xd50 [ 1228.598629] ? netlink_broadcast+0x50/0x50 [ 1228.602869] __netlink_dump_start+0x4f1/0x6f0 [ 1228.607364] ? tipc_data_ready+0x3e0/0x3e0 [ 1228.611599] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 1228.616712] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 1228.621384] ? tipc_data_ready+0x3e0/0x3e0 [ 1228.625618] ? tipc_unregister_sysctl+0x20/0x20 [ 1228.630287] ? tipc_ioctl+0x3a0/0x3a0 [ 1228.634093] ? netlink_deliver_tap+0x355/0xf80 [ 1228.638679] sock_diag_rcv_msg+0x31d/0x410 [ 1228.642916] netlink_rcv_skb+0x172/0x440 [ 1228.646984] ? sock_diag_bind+0x80/0x80 [ 1228.650962] ? netlink_ack+0xb80/0xb80 [ 1228.654871] sock_diag_rcv+0x2a/0x40 [ 1228.658586] netlink_unicast+0x5a5/0x760 [ 1228.662650] ? netlink_attachskb+0x9a0/0x9a0 [ 1228.667059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1228.672599] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1228.677619] netlink_sendmsg+0xa18/0xfc0 [ 1228.681684] ? netlink_unicast+0x760/0x760 [ 1228.685916] ? smack_socket_sendmsg+0xb0/0x190 [ 1228.690497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1228.696030] ? security_socket_sendmsg+0x94/0xc0 [ 1228.700784] ? netlink_unicast+0x760/0x760 [ 1228.705017] sock_sendmsg+0xd5/0x120 [ 1228.708732] ___sys_sendmsg+0x7fd/0x930 [ 1228.712712] ? __local_bh_enable_ip+0x160/0x260 [ 1228.717387] ? copy_msghdr_from_user+0x580/0x580 [ 1228.722147] ? kasan_check_write+0x14/0x20 [ 1228.726380] ? _raw_spin_unlock_bh+0x30/0x40 [ 1228.730790] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1228.736259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1228.741828] ? release_sock+0x1ec/0x2c0 [ 1228.745812] ? __fget_light+0x2e9/0x430 [ 1228.749793] ? fget_raw+0x20/0x20 [ 1228.753262] ? __release_sock+0x3a0/0x3a0 [ 1228.757422] ? tipc_nametbl_build_group+0x273/0x360 [ 1228.762451] ? tipc_setsockopt+0x726/0xd70 [ 1228.766697] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1228.772246] ? sockfd_lookup_light+0xc5/0x160 [ 1228.776746] __sys_sendmsg+0x11d/0x280 [ 1228.780636] ? __ia32_sys_shutdown+0x80/0x80 [ 1228.785050] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1228.790594] ? fput+0x130/0x1a0 [ 1228.793885] ? __x64_sys_futex+0x47f/0x6a0 [ 1228.798132] ? do_syscall_64+0x9a/0x820 [ 1228.802108] ? do_syscall_64+0x9a/0x820 [ 1228.806096] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1228.811553] __x64_sys_sendmsg+0x78/0xb0 [ 1228.815617] do_syscall_64+0x1b9/0x820 [ 1228.819503] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1228.824866] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1228.829795] ? trace_hardirqs_on_caller+0x310/0x310 [ 1228.834810] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1228.839824] ? recalc_sigpending_tsk+0x180/0x180 [ 1228.844581] ? kasan_check_write+0x14/0x20 [ 1228.848822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1228.853670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1228.858856] RIP: 0033:0x4572d9 [ 1228.862054] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1228.880960] RSP: 002b:00007f9258974c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1228.888686] RAX: ffffffffffffffda RBX: 00007f92589756d4 RCX: 00000000004572d9 [ 1228.895953] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 1228.903228] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1228.910501] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1228.917770] R13: 00000000004d4f40 R14: 00000000004c941e R15: 0000000000000000 [ 1228.926319] Kernel Offset: disabled [ 1228.929946] Rebooting in 86400 seconds..