33c5209397aa68566b04975ccae83129ab1adaa2977ce765ece1105149d5c555b42ddd9ba9326143305f42b5290d8affc4f151f6d98d52f213f0abbe82d1ae232f74497100667f6ce0fad84ab492237aa1a001f913c7451fbf302ad5fe1c22dd02e5f3f0ea787c83bd2383cf4265d06260650b27f2b00a3f66d393d25791d55cb1e1a3c44195d9f1151829687f3af5c348705c478ae9be8a4e3cd697bde064d3ffba61cf3160dcbd036690699aa3902e81cf9d63191e0f5f04b91f5a9ea9b7e592cfed48f50fafbebd1c3af8b62a57139389e8dc35f76c1d6e5a6753703b5912812efe43108ddee8eda69e751376ab8dec3bbda3a62a499aa384ca9d8cb87ca7bdcfcca56fde481abeef4d9c0c875d03f80faca1453bdb31258a221771b626ee8f9faefc52ec2fb86b806a1f64995be6a11f00ea6d88c2a8d69276e3b9f7ce0b6347adf32e79c2056f8eef7a4bb46b4738785ee65a1d19a1dcaca9c453e6d13d90db4c4d7ec447627a99a5116ffb907841d09e1c1a0485327c606da1c6bcfafbd5973d473bb28ab81072c6ad693122ff63a7db932f014e7ecbb2d48abde24d3838e3c957bfdc31990655817de6392b919c3da3ef4c4408a2bece7f5cd9bd10d7c77840122b40768d62969138e42994a6a88403b3fa00112dbd72ebc55adce2646c1236effd3a6c2df4470fd2248282973ce5e9337deeb84633cef3ae44fd1e8ad28b2e0052ed4e36fd48cf1b66a6d353d14556cde121ece9d45efa0f0b3793f967d2d1420007c618123a999a7cac9e5cc65e2591c0ea514ee1732e1c415729e2396c602875c2b585e19519a3c49db90de6f5c46253cbe41d8ee4506eaf8c839e0c590cf591c37485a5730974ad84107c586b7ee4c9652a34438bebeee7355045a61f6b474e7b47b692be1697af51bcbeed278e17d58da59da9bb31487e18545274ad18dbf9af6d2e78a4fc891de15ceed939dddd1f05fbf0ca312b7f9a08162e77902e8d68c8c7c6c5429dc2c1aa1f703cd2a033c2357fdd61f569e9c9b98645874c494549d3f22646e7db6a0050a02bd5c85ac0d8bcc4bb69cbdecdb2885581519eb41b935aabbbadc3388d52d42b9f5a70ee471e614d52ef1da26ec41d8b6523be8e4bdc91e0aa060f57b139634b278250ae07396d243472798e09d6d5bf1f8bc5a2351f9ed33ef47fe84193ede5151df7100753be5d5909ab32a65b414477ddb39a34419be5a20cdb815df60c8f7badb8fb52316cf59a10c88b7b2ad3739f1c0667d0d1f81e95b4adab5088421bf165a609d8cf11231e4808a2d08f7d5d1f069a1bbc909793152c99367cfde95f8dcad29473f913504adb22694f70ee1eecca26865ba16767768a6f429a7b2b8158fe16ad4892eefb442733e3647fbca6f5087a1adce54dee8f5027a2d21aecb9eaec62df79469852bdd91b71984c4d89d80e9e20199d0a56cb11eb49c406de1af2bff48d015f9cfc6a8a2d1f114a62abf3189a821a8895efafe98155879859c334ea2672884bedbf9d1df1d4b28d1bc7b739b93fab41a69a197c824bb28c586dfc0475f82023d8e5060de72e2c3eb178b7a04cf862f5a1f55aa1d9c7994c2e9415bc34817c562d85ba0107eb8d948a06f74d7efbfb59f78407d4a9630728c83039fe419727ba2246ff09e3caeda8b125555ec6cf7e9b859605b362ab676d488b4414cafc6e8774b521f97c08e60880886be6d7c826376d98f6bde59616d4806b7758480b50c1cc9baa01755e29d0cb7027776a5dfbc4daa48d033dca93b63c7a931c9691ef698bea984b817021ea6e3e2e97053ed928b4c6ca62d5a48f79a93c6312ec7b401e98fa20fc3d6be3cd1d0d9282ee82f6c92762c2ac28f0e1bc6ad2e8c6b9ce4550077351a5526b1f411e9f4a80336bbb5c3d140584f85cd4022d469d80937a1868066204e55a4ffe3ae2dabf9ab9908c7acf9392c9457480016a51d2278f9316c442f4e47744478bb6d894b7d44b7f5d0d36d88bc959b924f0dfb18847fc8534687e2cf78162b33adde7e7bcffa077b7c68d603a7ff2255dda8dc6434c6ecd223df8dea0b0e60807a8b2bf68f7afff3d096d17c2fd7bd9fef298fc3624e229f9932c07a9bf4960c1ea471f877dbf19dc48df625058acc5e66cebbdd5ce81422d0de8f8ec96a60d5910145b802d38532187fca0173181fe6d0b4afc08002c7837ed79fea2edcc25147d9895078999471da7860f858f3fd8e60e4e750ca82f3715e4c56b89f5908d6f9d6260db62e095b4923e97c4784825850bfb088bad60acb253aefbed20f690a9228c06553ba1ad1723bed174ef2e1f56dc55d49ab328baef28773a1ec0e957bfe2ad5d6a6caaa91bacb4f2dd66cdcbdfe5790c7ede46d4cb4bccd4f57d9d0b4740b897eb4287a8c7db0397a87acc143f924be3ec31f7c09a8fac946e22ad1f640f5244678f44d1c2c432527f79777f55363dc87c9d782b556b8e2719cae8086e88f9904ab41fdd82f11834dc52235088891b811ec815e7d4fe8edf6b3422996d9791401b9b9d00ddb3a3eeab4e420d7ba29c58704b2aa6db963c1d9a93396707ee94b5e2dfc952afa48670bc8784e3fa95e80fee4f95e909e9433011faed69a8b17e76ed76062bfcef88526fc6c02344ab18f67d71f3d0fe3f7dd6e346e96910f44929a090eb39d5661a795ec3c5860a525eef1941b6e1ccb01edeceb15a11ec74e9e75788361e83178a39e646b0ca132ab59523233bf0f9232005982fd1ec0dfe84c48db1490230095fd259edda720e", 0xbf4, r3) read(0xffffffffffffffff, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) epoll_create1(0x0) gettid() syz_open_pts(0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001400)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000001500)=0xe8) mount$fuse(0x0, &(0x7f00000013c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 03:34:46 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") keyctl$invalidate(0x15, 0x0) 03:34:46 executing program 3: mount(&(0x7f0000000480)=@loop={'/dev/loop'}, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)) futimesat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={{0x77359400}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xa4) quotactl(0x0, &(0x7f00000001c0)='.\x00', 0x0, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)) read$eventfd(0xffffffffffffffff, &(0x7f0000000400), 0x2ea) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000180)={'ah\x00'}, &(0x7f0000000440)=0x1e) fstatfs(0xffffffffffffffff, &(0x7f0000000600)=""/4096) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380)='syzkaller0\x00', 0x10) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000540), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:46 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback={0xff00000000000000}}], 0x1c) 03:34:46 executing program 0: accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000580)={0x2, 0x0, @loopback}, &(0x7f0000000700)=0x10) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000004c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000500)='net/fib_triestat\x00') ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) getgroups(0x0, &(0x7f0000000000)) setregid(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)=""/70, 0x46}) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) fstat(0xffffffffffffffff, &(0x7f0000000680)) geteuid() getresgid(&(0x7f0000000540), &(0x7f00000026c0), &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000002740)) stat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)) fstat(0xffffffffffffffff, &(0x7f0000002880)) getresgid(&(0x7f0000002900), &(0x7f0000002940), &(0x7f0000002980)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000029c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000002ac0)=0xe8) getresgid(&(0x7f0000002b00), 0xfffffffffffffffe, &(0x7f0000002b40)) lstat(&(0x7f0000002ec0)='./file0\x00', &(0x7f0000002f00)) fstat(0xffffffffffffffff, &(0x7f0000002f80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:34:47 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x0, &(0x7f0000001580)={[{@statfs_percent={'statfs_percent', 0x3d, 0x80000000}}]}) 03:34:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000100), 0x8b, 0x0, &(0x7f0000191000), &(0x7f0000000000), 0x0) [ 465.540156] gfs2: statfs_percent mount option requires a numeric argument between 0 and 100 [ 465.571121] gfs2: can't parse mount arguments 03:34:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000100), 0x8b, 0x0, &(0x7f0000191000), &(0x7f0000000000), 0x0) [ 465.620508] gfs2: statfs_percent mount option requires a numeric argument between 0 and 100 [ 465.649543] gfs2: can't parse mount arguments 03:34:47 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x0, &(0x7f0000001580)={[{@statfs_percent={'statfs_percent', 0x3d, 0x80000000}}]}) 03:34:47 executing program 1: times(&(0x7f0000000080)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") memfd_create(&(0x7f0000000040)="8f6b657972696e672f2700", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000680)) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'veth1\x00', @ifru_addrs=@can}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000003c0)={@dev}, &(0x7f0000000400)=0x14) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x0, "5b50552ae2ffca66444373238f6e7907"}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@local}}, &(0x7f0000000540)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @multicast2, @dev}, &(0x7f00000005c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@local, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000007c0)=0xfffffeed) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{0x0, 0x989680}}, &(0x7f0000000640)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000d00)={'vcan0\x00'}) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) 03:34:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000100), 0x8b, 0x0, &(0x7f0000191000), &(0x7f0000000000), 0x0) [ 465.876298] gfs2: statfs_percent mount option requires a numeric argument between 0 and 100 [ 465.904480] gfs2: can't parse mount arguments 03:34:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000100), 0x8b, 0x0, &(0x7f0000191000), &(0x7f0000000000), 0x0) 03:34:47 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x422440, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007440)=[{{&(0x7f0000005b80)=@nfc_llcp, 0x80, &(0x7f0000006200), 0x0, &(0x7f0000006280)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000007640)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001380)={[{0x2d, 'rdma'}, {0x0, 'memory'}, {0x2d, 'rdma'}, {0x2d, 'rdma'}]}, 0x1a) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000001c0)="aa59ea7e5fabe3c2e5a8e6ee04ab6d50a805f9ee2c435fac05c36fd8f9b6aa3fa00db311237dd463ebc00fccbe5db5c5ba9d713cbfba762812b3b56116435476b8f00bc011fef1c084f2529e3435fca97b47865af39ad620b5f02cbeee85690d4cfe687bfb3ed80c25d8fa2e642aaeb653c6d41f591015b9a0f1cf43ede11f222d9492eed5983860100f147767", 0x8d, 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f00000012c0)='keyring\x00', &(0x7f0000001300)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, r2, &(0x7f00000002c0)="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", 0xbf4, r3) read(0xffffffffffffffff, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) epoll_create1(0x0) gettid() syz_open_pts(0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001400)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000001500)=0xe8) mount$fuse(0x0, &(0x7f00000013c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 03:34:47 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x0, &(0x7f0000001580)={[{@statfs_percent={'statfs_percent', 0x3d, 0x80000000}}]}) [ 466.145961] gfs2: statfs_percent mount option requires a numeric argument between 0 and 100 [ 466.194321] gfs2: can't parse mount arguments 03:34:47 executing program 3: clock_gettime(0x8, &(0x7f00000001c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000200), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) add_key(&(0x7f0000000240)='rxrpc\x00', &(0x7f0000000280), 0x0, 0x0, 0x0) request_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300), &(0x7f0000000340)='\x00', 0xfffffffffffffff9) add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f0000000480), &(0x7f00000004c0)=""/25, 0x19, &(0x7f0000000540)={&(0x7f0000000500)={'rmd128\x00'}}) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x388) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:47 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x422440, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007440)=[{{&(0x7f0000005b80)=@nfc_llcp, 0x80, &(0x7f0000006200), 0x0, &(0x7f0000006280)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000007640)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001380)={[{0x2d, 'rdma'}, {0x0, 'memory'}, {0x2d, 'rdma'}, {0x2d, 'rdma'}]}, 0x1a) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000001c0)="aa59ea7e5fabe3c2e5a8e6ee04ab6d50a805f9ee2c435fac05c36fd8f9b6aa3fa00db311237dd463ebc00fccbe5db5c5ba9d713cbfba762812b3b56116435476b8f00bc011fef1c084f2529e3435fca97b47865af39ad620b5f02cbeee85690d4cfe687bfb3ed80c25d8fa2e642aaeb653c6d41f591015b9a0f1cf43ede11f222d9492eed5983860100f147767", 0x8d, 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f00000012c0)='keyring\x00', &(0x7f0000001300)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, r2, &(0x7f00000002c0)="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", 0xbf4, r3) read(0xffffffffffffffff, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) epoll_create1(0x0) gettid() syz_open_pts(0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001400)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000001500)=0xe8) mount$fuse(0x0, &(0x7f00000013c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 03:34:47 executing program 0: accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000580)={0x2, 0x0, @loopback}, &(0x7f0000000700)=0x10) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000004c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000500)='net/fib_triestat\x00') ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) getgroups(0x0, &(0x7f0000000000)) setregid(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)=""/70, 0x46}) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) fstat(0xffffffffffffffff, &(0x7f0000000680)) geteuid() getresgid(&(0x7f0000000540), &(0x7f00000026c0), &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000002740)) stat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)) fstat(0xffffffffffffffff, &(0x7f0000002880)) getresgid(&(0x7f0000002900), &(0x7f0000002940), &(0x7f0000002980)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000029c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000002ac0)=0xe8) getresgid(&(0x7f0000002b00), 0xfffffffffffffffe, &(0x7f0000002b40)) lstat(&(0x7f0000002ec0)='./file0\x00', &(0x7f0000002f00)) fstat(0xffffffffffffffff, &(0x7f0000002f80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:34:47 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x0, &(0x7f0000001580)={[{@statfs_percent={'statfs_percent', 0x3d, 0x80000000}}]}) [ 466.479564] gfs2: statfs_percent mount option requires a numeric argument between 0 and 100 [ 466.517769] gfs2: can't parse mount arguments 03:34:48 executing program 5: clock_gettime(0x2, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000044c0)=0xe8) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004680), &(0x7f00000046c0)=0xc) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:48 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_data=&(0x7f00000000c0)="a325d3c91116bf66fed2b246a94500aa6593352d29be1746fd84168b6ef37b32"}) 03:34:48 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_data=&(0x7f00000000c0)="a325d3c91116bf66fed2b246a94500aa6593352d29be1746fd84168b6ef37b32"}) 03:34:48 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_data=&(0x7f00000000c0)="a325d3c91116bf66fed2b246a94500aa6593352d29be1746fd84168b6ef37b32"}) 03:34:48 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x422440, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007440)=[{{&(0x7f0000005b80)=@nfc_llcp, 0x80, &(0x7f0000006200), 0x0, &(0x7f0000006280)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000007640)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001380)={[{0x2d, 'rdma'}, {0x0, 'memory'}, {0x2d, 'rdma'}, {0x2d, 'rdma'}]}, 0x1a) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000001c0)="aa59ea7e5fabe3c2e5a8e6ee04ab6d50a805f9ee2c435fac05c36fd8f9b6aa3fa00db311237dd463ebc00fccbe5db5c5ba9d713cbfba762812b3b56116435476b8f00bc011fef1c084f2529e3435fca97b47865af39ad620b5f02cbeee85690d4cfe687bfb3ed80c25d8fa2e642aaeb653c6d41f591015b9a0f1cf43ede11f222d9492eed5983860100f147767", 0x8d, 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f00000012c0)='keyring\x00', &(0x7f0000001300)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, r2, &(0x7f00000002c0)="3e169137a58d711c759934f1e856d5cd374a209037ae5da78923404094d11e5e7df6c6ca84c8719203123533e4a1b41cdc8d58b14c2f87fa5ebff798ac81e6028936bf9da086c89703b7e7bf5d3678ff4a4bcac3450a326ca1088379e4538db5304cfc116ffa736911b09d000b0bfa5a7768791b1f694a9b75ba1cb2365790ad40c3278e9eb1df755ce3091296e4f62f2b17886cef300388c20f8d42bb7566f7224995663b5984d141956f88935c4869826f5026c3589c7b97f3f22afb9304ee860f693f6d58f1eed2edde52f4c3779ee3754a41bcf5daa3e281ccaaa05a6d163b0dc3a55aec5b380e4affac4dbe26f5b34e8d632038ca42fd820215fffd771823b7888ded9cf450faca3543b9cae33e9e6bb9fd9e8a585b18e0352e070f98b1e87cf2882036a0b263afd60af4f7ae74663ef52dc8a79073d59907856c57119b7d2421f21a85e8d6d985541d821c03017c1deab10c5bd5389200f77b3902f09cf30af20453090a7a4f246ff7bf821e9012b27bf597e390af834852cac20ec552804df958c5996285e256ab423fd9d7e1202e1c2e8ac0ea148f3a668bf60f28c0e4b73c4d77fc47e00373a0afe6adde0fe60c1744ef59e326fbf81a68904fa2e80f6b56031a2913df3f013380d5557d824e32f22c25163fe0f37d5a2efaf9bd66ca27d5f7478065b39c992c0b4bad0d7f39b8e227901afc27f76b00c467eb3062b46dc4b576d4ee2c5940d779cdf009372922a84812dfee938530c6debf01513e323942dab28eb616499e49427b067714ac2755ffadf930cf178d5e8c5ebbcccdcd7654aeceb976d361b7b82ab201e9ff71155c8203299a603ef31e7130813b42170e55903f7e784ad1c6f2e0d20ecf28e7139a2ab3b0b0939e906403c9dde19c86d97cffbe087594c1b87c366b762ba2dfd8fe46874c93c144d9ef58c425db6018e0cbbdb55258eecc77f9c3c16e0e730caf7b8157aa68e8e887ed840273620e5ce31d873f62c3f5d799f826748baa1a508887766c64c4889a5cb369d76502be4576c190de058b9cc3fc90f113f129e97d5393c4274a0828c329dbe780b1a430c8cf1f1e8014ec3ebd66f49321af55b3d10593880e134f85204b6bd20cd2df9046936216a103cec1806382bba1379f34b37d7bfecf8d3299981548e99de91db22170ccafeb09313f19163aab4b84b07f1c5bda75e799fc735664cdb82829190db6f9a34a1ef77a942a7337d83c13bfdaaed10bf31a97d9912a07f5f9ef6bbfb8a4d99cbb6154621342749b58fb775148db7b0744a64e7b4b2dc93ee98e7c12a8c601cb19cb70236c4699f77174c727587e0292d8188a8beaefc3f233c6b10a017dfeb4ce8a6225b80c587eac07210475c0d7d9b56ad011463d2a63ba343add2a684ae14d0fcfeaa7df459ff342ae4723ed62a44b51c8191ad6298786003cb20ea1b9a00bc16f2a0c9c63d9c1955ec18b3ce0140e78643be736d8cf85e3c497641e2808aeb222f38f8753cb40288a542dc239bf872ce0e3c13fdb927db55f9d6a5b8874c27f3540ce33c5209397aa68566b04975ccae83129ab1adaa2977ce765ece1105149d5c555b42ddd9ba9326143305f42b5290d8affc4f151f6d98d52f213f0abbe82d1ae232f74497100667f6ce0fad84ab492237aa1a001f913c7451fbf302ad5fe1c22dd02e5f3f0ea787c83bd2383cf4265d06260650b27f2b00a3f66d393d25791d55cb1e1a3c44195d9f1151829687f3af5c348705c478ae9be8a4e3cd697bde064d3ffba61cf3160dcbd036690699aa3902e81cf9d63191e0f5f04b91f5a9ea9b7e592cfed48f50fafbebd1c3af8b62a57139389e8dc35f76c1d6e5a6753703b5912812efe43108ddee8eda69e751376ab8dec3bbda3a62a499aa384ca9d8cb87ca7bdcfcca56fde481abeef4d9c0c875d03f80faca1453bdb31258a221771b626ee8f9faefc52ec2fb86b806a1f64995be6a11f00ea6d88c2a8d69276e3b9f7ce0b6347adf32e79c2056f8eef7a4bb46b4738785ee65a1d19a1dcaca9c453e6d13d90db4c4d7ec447627a99a5116ffb907841d09e1c1a0485327c606da1c6bcfafbd5973d473bb28ab81072c6ad693122ff63a7db932f014e7ecbb2d48abde24d3838e3c957bfdc31990655817de6392b919c3da3ef4c4408a2bece7f5cd9bd10d7c77840122b40768d62969138e42994a6a88403b3fa00112dbd72ebc55adce2646c1236effd3a6c2df4470fd2248282973ce5e9337deeb84633cef3ae44fd1e8ad28b2e0052ed4e36fd48cf1b66a6d353d14556cde121ece9d45efa0f0b3793f967d2d1420007c618123a999a7cac9e5cc65e2591c0ea514ee1732e1c415729e2396c602875c2b585e19519a3c49db90de6f5c46253cbe41d8ee4506eaf8c839e0c590cf591c37485a5730974ad84107c586b7ee4c9652a34438bebeee7355045a61f6b474e7b47b692be1697af51bcbeed278e17d58da59da9bb31487e18545274ad18dbf9af6d2e78a4fc891de15ceed939dddd1f05fbf0ca312b7f9a08162e77902e8d68c8c7c6c5429dc2c1aa1f703cd2a033c2357fdd61f569e9c9b98645874c494549d3f22646e7db6a0050a02bd5c85ac0d8bcc4bb69cbdecdb2885581519eb41b935aabbbadc3388d52d42b9f5a70ee471e614d52ef1da26ec41d8b6523be8e4bdc91e0aa060f57b139634b278250ae07396d243472798e09d6d5bf1f8bc5a2351f9ed33ef47fe84193ede5151df7100753be5d5909ab32a65b414477ddb39a34419be5a20cdb815df60c8f7badb8fb52316cf59a10c88b7b2ad3739f1c0667d0d1f81e95b4adab5088421bf165a609d8cf11231e4808a2d08f7d5d1f069a1bbc909793152c99367cfde95f8dcad29473f913504adb22694f70ee1eecca26865ba16767768a6f429a7b2b8158fe16ad4892eefb442733e3647fbca6f5087a1adce54dee8f5027a2d21aecb9eaec62df79469852bdd91b71984c4d89d80e9e20199d0a56cb11eb49c406de1af2bff48d015f9cfc6a8a2d1f114a62abf3189a821a8895efafe98155879859c334ea2672884bedbf9d1df1d4b28d1bc7b739b93fab41a69a197c824bb28c586dfc0475f82023d8e5060de72e2c3eb178b7a04cf862f5a1f55aa1d9c7994c2e9415bc34817c562d85ba0107eb8d948a06f74d7efbfb59f78407d4a9630728c83039fe419727ba2246ff09e3caeda8b125555ec6cf7e9b859605b362ab676d488b4414cafc6e8774b521f97c08e60880886be6d7c826376d98f6bde59616d4806b7758480b50c1cc9baa01755e29d0cb7027776a5dfbc4daa48d033dca93b63c7a931c9691ef698bea984b817021ea6e3e2e97053ed928b4c6ca62d5a48f79a93c6312ec7b401e98fa20fc3d6be3cd1d0d9282ee82f6c92762c2ac28f0e1bc6ad2e8c6b9ce4550077351a5526b1f411e9f4a80336bbb5c3d140584f85cd4022d469d80937a1868066204e55a4ffe3ae2dabf9ab9908c7acf9392c9457480016a51d2278f9316c442f4e47744478bb6d894b7d44b7f5d0d36d88bc959b924f0dfb18847fc8534687e2cf78162b33adde7e7bcffa077b7c68d603a7ff2255dda8dc6434c6ecd223df8dea0b0e60807a8b2bf68f7afff3d096d17c2fd7bd9fef298fc3624e229f9932c07a9bf4960c1ea471f877dbf19dc48df625058acc5e66cebbdd5ce81422d0de8f8ec96a60d5910145b802d38532187fca0173181fe6d0b4afc08002c7837ed79fea2edcc25147d9895078999471da7860f858f3fd8e60e4e750ca82f3715e4c56b89f5908d6f9d6260db62e095b4923e97c4784825850bfb088bad60acb253aefbed20f690a9228c06553ba1ad1723bed174ef2e1f56dc55d49ab328baef28773a1ec0e957bfe2ad5d6a6caaa91bacb4f2dd66cdcbdfe5790c7ede46d4cb4bccd4f57d9d0b4740b897eb4287a8c7db0397a87acc143f924be3ec31f7c09a8fac946e22ad1f640f5244678f44d1c2c432527f79777f55363dc87c9d782b556b8e2719cae8086e88f9904ab41fdd82f11834dc52235088891b811ec815e7d4fe8edf6b3422996d9791401b9b9d00ddb3a3eeab4e420d7ba29c58704b2aa6db963c1d9a93396707ee94b5e2dfc952afa48670bc8784e3fa95e80fee4f95e909e9433011faed69a8b17e76ed76062bfcef88526fc6c02344ab18f67d71f3d0fe3f7dd6e346e96910f44929a090eb39d5661a795ec3c5860a525eef1941b6e1ccb01edeceb15a11ec74e9e75788361e83178a39e646b0ca132ab59523233bf0f9232005982fd1ec0dfe84c48db1490230095fd259edda720e", 0xbf4, r3) read(0xffffffffffffffff, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) epoll_create1(0x0) gettid() syz_open_pts(0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001400)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000001500)=0xe8) mount$fuse(0x0, &(0x7f00000013c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 03:34:48 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000140)={'ip6tnl0\x00', @ifru_data=&(0x7f00000000c0)="a325d3c91116bf66fed2b246a94500aa6593352d29be1746fd84168b6ef37b32"}) 03:34:48 executing program 0: accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000580)={0x2, 0x0, @loopback}, &(0x7f0000000700)=0x10) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000004c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000500)='net/fib_triestat\x00') ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) getgroups(0x0, &(0x7f0000000000)) setregid(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)=""/70, 0x46}) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) fstat(0xffffffffffffffff, &(0x7f0000000680)) geteuid() getresgid(&(0x7f0000000540), &(0x7f00000026c0), &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000002740)) stat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)) fstat(0xffffffffffffffff, &(0x7f0000002880)) getresgid(&(0x7f0000002900), &(0x7f0000002940), &(0x7f0000002980)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000029c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000002ac0)=0xe8) getresgid(&(0x7f0000002b00), 0xfffffffffffffffe, &(0x7f0000002b40)) lstat(&(0x7f0000002ec0)='./file0\x00', &(0x7f0000002f00)) fstat(0xffffffffffffffff, &(0x7f0000002f80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:34:48 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x422440, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007440)=[{{&(0x7f0000005b80)=@nfc_llcp, 0x80, &(0x7f0000006200), 0x0, &(0x7f0000006280)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000007640)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001380)={[{0x2d, 'rdma'}, {0x0, 'memory'}, {0x2d, 'rdma'}, {0x2d, 'rdma'}]}, 0x1a) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000001c0)="aa59ea7e5fabe3c2e5a8e6ee04ab6d50a805f9ee2c435fac05c36fd8f9b6aa3fa00db311237dd463ebc00fccbe5db5c5ba9d713cbfba762812b3b56116435476b8f00bc011fef1c084f2529e3435fca97b47865af39ad620b5f02cbeee85690d4cfe687bfb3ed80c25d8fa2e642aaeb653c6d41f591015b9a0f1cf43ede11f222d9492eed5983860100f147767", 0x8d, 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f00000012c0)='keyring\x00', &(0x7f0000001300)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, r2, &(0x7f00000002c0)="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", 0xbf4, r3) read(0xffffffffffffffff, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) epoll_create1(0x0) gettid() syz_open_pts(0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001400)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000001500)=0xe8) mount$fuse(0x0, &(0x7f00000013c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 03:34:48 executing program 3: personality(0x1bb2baf3005ac137) mkdir(&(0x7f000002b000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000001, 0x11, r0, 0x0) 03:34:48 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000340), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xbc}, 0x21b}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000080)}) flistxattr(0xffffffffffffffff, &(0x7f0000000500)=""/104, 0xffffffffffffff2f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000340)={'bond_slave_1\x00', {0x2, 0x0, @loopback}}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000140)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000280)) pipe2(&(0x7f0000000040), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) truncate(&(0x7f0000000600)='./bus/../file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) 03:34:49 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f00000001c0), &(0x7f0000000280)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:49 executing program 5: getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:49 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x422440, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007440)=[{{&(0x7f0000005b80)=@nfc_llcp, 0x80, &(0x7f0000006200), 0x0, &(0x7f0000006280)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000007640)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001380)={[{0x2d, 'rdma'}, {0x0, 'memory'}, {0x2d, 'rdma'}, {0x2d, 'rdma'}]}, 0x1a) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000001c0)="aa59ea7e5fabe3c2e5a8e6ee04ab6d50a805f9ee2c435fac05c36fd8f9b6aa3fa00db311237dd463ebc00fccbe5db5c5ba9d713cbfba762812b3b56116435476b8f00bc011fef1c084f2529e3435fca97b47865af39ad620b5f02cbeee85690d4cfe687bfb3ed80c25d8fa2e642aaeb653c6d41f591015b9a0f1cf43ede11f222d9492eed5983860100f147767", 0x8d, 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f00000012c0)='keyring\x00', &(0x7f0000001300)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, r2, &(0x7f00000002c0)="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", 0xbf4, r3) read(0xffffffffffffffff, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) epoll_create1(0x0) gettid() syz_open_pts(0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001400)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000001500)=0xe8) mount$fuse(0x0, &(0x7f00000013c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 03:34:49 executing program 0: accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000580)={0x2, 0x0, @loopback}, &(0x7f0000000700)=0x10) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000004c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000500)='net/fib_triestat\x00') ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) getgroups(0x0, &(0x7f0000000000)) setregid(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)=""/70, 0x46}) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) fstat(0xffffffffffffffff, &(0x7f0000000680)) geteuid() getresgid(&(0x7f0000000540), &(0x7f00000026c0), &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000002740)) stat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)) fstat(0xffffffffffffffff, &(0x7f0000002880)) getresgid(&(0x7f0000002900), &(0x7f0000002940), &(0x7f0000002980)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000029c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000002ac0)=0xe8) getresgid(&(0x7f0000002b00), 0xfffffffffffffffe, &(0x7f0000002b40)) lstat(&(0x7f0000002ec0)='./file0\x00', &(0x7f0000002f00)) fstat(0xffffffffffffffff, &(0x7f0000002f80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:34:49 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x422440, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007440)=[{{&(0x7f0000005b80)=@nfc_llcp, 0x80, &(0x7f0000006200), 0x0, &(0x7f0000006280)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000007640)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001380)={[{0x2d, 'rdma'}, {0x0, 'memory'}, {0x2d, 'rdma'}, {0x2d, 'rdma'}]}, 0x1a) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000001c0)="aa59ea7e5fabe3c2e5a8e6ee04ab6d50a805f9ee2c435fac05c36fd8f9b6aa3fa00db311237dd463ebc00fccbe5db5c5ba9d713cbfba762812b3b56116435476b8f00bc011fef1c084f2529e3435fca97b47865af39ad620b5f02cbeee85690d4cfe687bfb3ed80c25d8fa2e642aaeb653c6d41f591015b9a0f1cf43ede11f222d9492eed5983860100f147767", 0x8d, 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f00000012c0)='keyring\x00', &(0x7f0000001300)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, r2, &(0x7f00000002c0)="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", 0xbf4, r3) read(0xffffffffffffffff, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) epoll_create1(0x0) gettid() syz_open_pts(0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001400)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000001500)=0xe8) mount$fuse(0x0, &(0x7f00000013c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 03:34:49 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000340), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xbc}, 0x21b}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000080)}) flistxattr(0xffffffffffffffff, &(0x7f0000000500)=""/104, 0xffffffffffffff2f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000340)={'bond_slave_1\x00', {0x2, 0x0, @loopback}}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000140)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000280)) pipe2(&(0x7f0000000040), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) truncate(&(0x7f0000000600)='./bus/../file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) 03:34:50 executing program 3: keyctl$setperm(0x3, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001600)={@dev}, &(0x7f0000001640)=0x14) 03:34:50 executing program 5: getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:50 executing program 2: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000280)={0x3fa8, 0x74, 0x8009, 0x7f, 0x7, 0x3ff, 0xfffffffffffffff7, 0xfffffffffffffffc, 0x0}, &(0x7f0000000100)=0x343) socketpair(0xa, 0x800, 0x6, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f00000000c0), &(0x7f00000002c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000001c0)={r3, 0x3}, 0x8) syslog(0x2, &(0x7f0000000200)=""/89, 0x59) [ 468.916857] IPVS: ftp: loaded support on port[0] = 21 03:34:50 executing program 0: mlockall(0x6) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e021, 0x200000e, 0x13, r1, 0x0) 03:34:50 executing program 4: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) io_setup(0x8, &(0x7f0000000100)=0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x2, 0x0) io_submit(r2, 0x0, &(0x7f00000005c0)) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2000072e}]) [ 469.282512] IPVS: ftp: loaded support on port[0] = 21 03:34:50 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000340), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xbc}, 0x21b}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000080)}) flistxattr(0xffffffffffffffff, &(0x7f0000000500)=""/104, 0xffffffffffffff2f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000340)={'bond_slave_1\x00', {0x2, 0x0, @loopback}}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000140)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000280)) pipe2(&(0x7f0000000040), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) truncate(&(0x7f0000000600)='./bus/../file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) 03:34:50 executing program 2: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000280)={0x3fa8, 0x74, 0x8009, 0x7f, 0x7, 0x3ff, 0xfffffffffffffff7, 0xfffffffffffffffc, 0x0}, &(0x7f0000000100)=0x343) socketpair(0xa, 0x800, 0x6, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f00000000c0), &(0x7f00000002c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000001c0)={r3, 0x3}, 0x8) syslog(0x2, &(0x7f0000000200)=""/89, 0x59) 03:34:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001700)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@rtdev={'rtdev', 0x3d, './file0'}}]}) 03:34:51 executing program 0: getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000600)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000900)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in=@multicast1, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@multicast1}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000c00)=0xe8) getuid() getuid() geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) syz_execute_func(&(0x7f0000000500)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefac462f19de55dc4617d2b231a010d64ac1e5d31a3b786e2989f7f") 03:34:51 executing program 4: accept(0xffffffffffffff9c, &(0x7f0000000480)=@generic, &(0x7f0000000540)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001dc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e00)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001f00)=0xe8) lstat(&(0x7f0000001f40)='./file1\x00', &(0x7f0000001f80)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002080)) lstat(&(0x7f00000020c0)='./file1\x00', &(0x7f0000002100)) getegid() getpgrp(0xffffffffffffffff) geteuid() getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005ac0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b00)={{{@in, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000005c00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005c40), &(0x7f0000005c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005cc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005d00)={{{@in6=@dev, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000005e00)=0xe8) lstat(&(0x7f0000005e40)='./file0\x00', &(0x7f0000005e80)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() stat(&(0x7f0000005f00)='./file0\x00', &(0x7f0000005f40)) accept$inet(0xffffffffffffffff, &(0x7f0000006140)={0x2, 0x0, @multicast1}, &(0x7f0000006180)=0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000007740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007780), &(0x7f00000077c0)=0xc) lstat(&(0x7f0000007800)='./file0\x00', &(0x7f0000007840)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000078c0)) getresuid(&(0x7f0000007900), &(0x7f0000007940), &(0x7f0000007980)) fstat(0xffffffffffffffff, &(0x7f00000079c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007a40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007a80)={{{@in6=@remote, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000007b80)=0xe8) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007bc0)={{{@in6=@dev, @in=@broadcast}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000007cc0)=0xe8) lstat(&(0x7f0000007d00)='./file0\x00', &(0x7f0000007d40)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000080c0)) getpid() stat(&(0x7f0000008100)='./file0\x00', &(0x7f0000008140)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000008700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000008740)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000087c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008800), &(0x7f0000008840)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008bc0), &(0x7f0000008c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008c40)={{{@in6=@mcast2, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000008d40)=0xe8) 03:34:51 executing program 5: getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 469.537492] XFS (loop3): Invalid device [./file0], error=-15 [ 469.624007] IPVS: ftp: loaded support on port[0] = 21 [ 469.748199] XFS (loop3): Invalid device [./file0], error=-15 03:34:51 executing program 3: keyctl$join(0x1, &(0x7f0000000040)) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) pipe(&(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000700)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@multicast1}}}, &(0x7f0000000840)=0xe8) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getpgrp(0xffffffffffffffff) getgroups(0x0, &(0x7f0000000a80)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000bc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c00)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@local}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@remote}}, &(0x7f0000000d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000d40)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000f00)={&(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000dc0)=ANY=[]}, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000006ffc), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000900)="428055a0690fef6bdc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff66410f60db2e0ac4010d64ac1e5d31a314b706e298987b7f") 03:34:51 executing program 2: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000280)={0x3fa8, 0x74, 0x8009, 0x7f, 0x7, 0x3ff, 0xfffffffffffffff7, 0xfffffffffffffffc, 0x0}, &(0x7f0000000100)=0x343) socketpair(0xa, 0x800, 0x6, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f00000000c0), &(0x7f00000002c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000001c0)={r3, 0x3}, 0x8) syslog(0x2, &(0x7f0000000200)=""/89, 0x59) [ 470.282363] IPVS: ftp: loaded support on port[0] = 21 03:34:51 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000340), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xbc}, 0x21b}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000080)}) flistxattr(0xffffffffffffffff, &(0x7f0000000500)=""/104, 0xffffffffffffff2f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000340)={'bond_slave_1\x00', {0x2, 0x0, @loopback}}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000140)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000280)) pipe2(&(0x7f0000000040), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) truncate(&(0x7f0000000600)='./bus/../file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) 03:34:52 executing program 0: syslog(0x0, &(0x7f00000000c0)=""/29, 0xfff7) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000300), &(0x7f00000003c0)=0x8) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:52 executing program 5: getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x2001000000000002, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x0, 0x3, [0x8, 0x0, 0x0]}, &(0x7f00000002c0)=0xe) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x264, 0x3ef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8]}, 0x75, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x1d, r3}) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x0, 0x0, 0x100000000, 0x1c0270, r3}) r5 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="6c80dee22064ecc2e1a0f2bc4df55a7f4ee9b0d78c9e3fb08476e7c97b207cc059cb1ff0c49f962332426fa0b1501af6d8dfeb908d5536ea067a5659b04086344f5d2f19", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000300)=0xb) r6 = semget(0x3, 0x0, 0x2e2) semtimedop(r6, &(0x7f00000001c0)=[{0x4, 0x80, 0x1000}, {0x3, 0x1, 0x800}, {0x7, 0x6, 0x1000}, {0x0, 0x80000000, 0x800}, {0x7, 0x100000001, 0x1000}, {0x1, 0xffffffffffffff00, 0x800}, {0x7, 0x845}, {0x6, 0x1, 0x1800}], 0x8, &(0x7f0000000200)) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r7 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r7, 0x80045300, &(0x7f0000000000)) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8, 0x3, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000002c40)) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x5ffc, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000080)="c8c3822642625609b35166ff86bece4e45ba6e005099e00c82bdac3b201a408072834a9bbed1b4a4e84e0d066b072850e40603039b89d9074cb408aa9e52279ed93cbd8582417995a1ca953b93d0efcc01dc97feffed33aa51ab2919cf77737c30201fa2d8c34f498f8b3da940010c474919ca49da47085eb42c36ff67aa1c0c02cef0f5fafc1f6f59b35f0e59016ffcac91f68dae5fa3cc0248fc776124e52125c11bc7282eab83fd9dbc4763e52e94a2bc634e7f29e1c73d153af853d8", 0xbe, 0x8}], 0x20000, &(0x7f0000000200)=ANY=[]) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x111000, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r8, 0x84, 0x13, &(0x7f0000000280)=0x5, 0x4) 03:34:52 executing program 2: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000280)={0x3fa8, 0x74, 0x8009, 0x7f, 0x7, 0x3ff, 0xfffffffffffffff7, 0xfffffffffffffffc, 0x0}, &(0x7f0000000100)=0x343) socketpair(0xa, 0x800, 0x6, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f00000000c0), &(0x7f00000002c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000001c0)={r3, 0x3}, 0x8) syslog(0x2, &(0x7f0000000200)=""/89, 0x59) [ 470.919424] IPVS: ftp: loaded support on port[0] = 21 03:34:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x80300) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000100)=""/202, &(0x7f0000000240)=0xca) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000280)={"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"}) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00000fff0000000000000000000000000000000000000000e0e515320000000002008801260001000000640000000001", 0x30}]) [ 471.184334] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:34:53 executing program 1: accept(0xffffffffffffff9c, &(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, &(0x7f00000000c0)=0x80) syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') syz_open_dev$mouse(&(0x7f0000000380)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, &(0x7f00000003c0)) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200), 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:34:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x80300) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000100)=""/202, &(0x7f0000000240)=0xca) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000280)={"b61d3bbe52d75028290785806c026a89b9b1f382d910b3a4aa7b7a3be01627489bc78960dc4a8d8006367a195b9537b7da7acbd83e0c7d61ff9ee151c07b4a894822001e51c79ea8d975f519bd4c83773fab6d212d3bc009fdbe498bc54a964bc215400866865357fa8e35ef56474dc150404bf29ed0456914aa67901bf3d7bb3ba29e324fca8bd4a0b1b2bd278ea3a0576d82c8ae7d8e1fa5e723eee2bb10337bbd3c66f17e7948f81d8da2527dde4a2cd834303701ba103fd94a0c993fa9b5aa87cac21aa20bbe3c531f3c9e8669beca073b815e7c537fa9be19d59d746dda736ce163d030baae4f0950b5b23c7075cf9d19230bc6bf00eb1f130720d75a0f79ba1dd1d46a35bb539fc1d8a9393157a475375c53ed18909358365b478f1fbbea0a1ca9f467747ffb219a8c84c16bc5eb0f2799ef3bb223983ae829346b4f97dd22a040076fcd796b6c96b69b772fc9647ccfb451421195eab4dcec01a0ae5cf1eeb88cbf60a9a58a252997574fa4d3fa15bd5730bcb6b3dcbd030a02b62adf0c5f9b866d768f638248db923b0360cb0ebee0377228f71abe62f9c8b381f7d43be979417a721d041799eaddcaf7f92ffc2b207469251cab19ede5712a340c7c809ae5071851eae8307e464c4c9f04a6be73b0131401cbead4c9772e1bff9a75610e5ef0f22ea700bdac176d1d303bc4fc45f1a80cf38dd8cc2040c0fdec25243ab41e2d5b4371e25c4374926e7ef808821f05ff339ceca62ad91e010389279989f4146fe45ed09b80d32bce8176eeb5b00ef3c7cc5594f59d0dc9e48a4744f6d380ffb7dd8a7f662c1487e78c6941dd35a8d17c29d2c6905a770da057b33ee6e7a03a228ba26b3b9d703548ee6b2a680ee570919d73055421056009ad7f97409b83769aa2be3cbde957d65ea0396d045ad838d993ead88f01649a9c0e868ca9ee0fdd32fe11d1d18fb37bb61537f83680a80aa67c3a7b1bc26025b0286042bc453c3487fabc7d173a4edc3cb978f55cbdcc8d84d85dbaff93970e623f235b40485ca6ffdea0d56c9b87879fbcbea0f1e3e3d70d6d804d4de7e09bfa292d63b68139abe327863c86f559c3933ddc3651fd6fe5552e1654b1bca74f0dd11734a38f4de120a13f5a28fa4a16bc886c47f2a1c47572ec37de795a9aa8c943ee5162219171c3f78603e3ffeec37c20fbbd1394eda40b7e9d8a6b863f1ba8bfe778bb98527aa6e65f8d192f1b50b6d9890ae25c1ffc8e0fa432fe93d4cc7cd80d2715722a8e65f811f20176bc92e5cb1845824fc21c65d654e2d5f7d2810bcaefd14b26fb183f48606343fc981b35133d50f125bdc32f7510a7bb866b9f7d57c393ea253834ca0726e00640ebf77cffcd343dd203946443b16f59d43e59dff2e35701bc5852fafa68c03d486e2a4a65a0ef69fe29931828d5ba94ce954f3b21b493db"}) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00000fff0000000000000000000000000000000000000000e0e515320000000002008801260001000000640000000001", 0x30}]) 03:34:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000580)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000040)=0x80000000001, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) write$binfmt_misc(r0, &(0x7f0000000740)={'syz0', "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"}, 0x1001) sendto(r0, &(0x7f0000000280)="cd", 0x1, 0x0, &(0x7f0000000340)=@pppoe={0x18, 0x0, {0x0, @empty, 'bond0\x00'}}, 0x80) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) io_setup(0x1, &(0x7f0000000140)=0x0) r2 = fcntl$dupfd(r0, 0x0, r0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000180)="df", 0x1}]) 03:34:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x2001000000000002, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x0, 0x3, [0x8, 0x0, 0x0]}, &(0x7f00000002c0)=0xe) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x264, 0x3ef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8]}, 0x75, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x1d, r3}) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x0, 0x0, 0x100000000, 0x1c0270, r3}) r5 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="6c80dee22064ecc2e1a0f2bc4df55a7f4ee9b0d78c9e3fb08476e7c97b207cc059cb1ff0c49f962332426fa0b1501af6d8dfeb908d5536ea067a5659b04086344f5d2f19", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000300)=0xb) r6 = semget(0x3, 0x0, 0x2e2) semtimedop(r6, &(0x7f00000001c0)=[{0x4, 0x80, 0x1000}, {0x3, 0x1, 0x800}, {0x7, 0x6, 0x1000}, {0x0, 0x80000000, 0x800}, {0x7, 0x100000001, 0x1000}, {0x1, 0xffffffffffffff00, 0x800}, {0x7, 0x845}, {0x6, 0x1, 0x1800}], 0x8, &(0x7f0000000200)) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r7 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r7, 0x80045300, &(0x7f0000000000)) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8, 0x3, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000002c40)) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x5ffc, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000080)="c8c3822642625609b35166ff86bece4e45ba6e005099e00c82bdac3b201a408072834a9bbed1b4a4e84e0d066b072850e40603039b89d9074cb408aa9e52279ed93cbd8582417995a1ca953b93d0efcc01dc97feffed33aa51ab2919cf77737c30201fa2d8c34f498f8b3da940010c474919ca49da47085eb42c36ff67aa1c0c02cef0f5fafc1f6f59b35f0e59016ffcac91f68dae5fa3cc0248fc776124e52125c11bc7282eab83fd9dbc4763e52e94a2bc634e7f29e1c73d153af853d8", 0xbe, 0x8}], 0x20000, &(0x7f0000000200)=ANY=[]) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x111000, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r8, 0x84, 0x13, &(0x7f0000000280)=0x5, 0x4) 03:34:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000c61f"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000001) 03:34:53 executing program 0: getuid() socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) syz_open_dev$rtc(&(0x7f00000003c0)='/dev/rtc#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/sequencer\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f000000af00)) getgid() openat$ion(0xffffffffffffff9c, &(0x7f000000af40)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f000000af80)='/dev/amidi#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f000000afc0)='/dev/snapshot\x00', 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) socket$inet_dccp(0x2, 0x6, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f000000b000)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:53 executing program 2: ioperm(0x0, 0x101, 0x3) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000300), &(0x7f00000003c0)=0x1c, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@loopback}, &(0x7f0000000440)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @dev, @local}, &(0x7f00000005c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team_slave_1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000a40)={{{@in=@loopback, @in=@broadcast}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@dev}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000cc0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e40)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000f40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f80)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000001080)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001100)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001140)={0x0, @rand_addr, @multicast2}, &(0x7f0000001180)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000011c0)={@mcast1}, &(0x7f0000001200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001240)={@dev, @multicast1}, &(0x7f0000001280)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001440)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000001540)=0xe8) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x80300) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000100)=""/202, &(0x7f0000000240)=0xca) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000280)={"b61d3bbe52d75028290785806c026a89b9b1f382d910b3a4aa7b7a3be01627489bc78960dc4a8d8006367a195b9537b7da7acbd83e0c7d61ff9ee151c07b4a894822001e51c79ea8d975f519bd4c83773fab6d212d3bc009fdbe498bc54a964bc215400866865357fa8e35ef56474dc150404bf29ed0456914aa67901bf3d7bb3ba29e324fca8bd4a0b1b2bd278ea3a0576d82c8ae7d8e1fa5e723eee2bb10337bbd3c66f17e7948f81d8da2527dde4a2cd834303701ba103fd94a0c993fa9b5aa87cac21aa20bbe3c531f3c9e8669beca073b815e7c537fa9be19d59d746dda736ce163d030baae4f0950b5b23c7075cf9d19230bc6bf00eb1f130720d75a0f79ba1dd1d46a35bb539fc1d8a9393157a475375c53ed18909358365b478f1fbbea0a1ca9f467747ffb219a8c84c16bc5eb0f2799ef3bb223983ae829346b4f97dd22a040076fcd796b6c96b69b772fc9647ccfb451421195eab4dcec01a0ae5cf1eeb88cbf60a9a58a252997574fa4d3fa15bd5730bcb6b3dcbd030a02b62adf0c5f9b866d768f638248db923b0360cb0ebee0377228f71abe62f9c8b381f7d43be979417a721d041799eaddcaf7f92ffc2b207469251cab19ede5712a340c7c809ae5071851eae8307e464c4c9f04a6be73b0131401cbead4c9772e1bff9a75610e5ef0f22ea700bdac176d1d303bc4fc45f1a80cf38dd8cc2040c0fdec25243ab41e2d5b4371e25c4374926e7ef808821f05ff339ceca62ad91e010389279989f4146fe45ed09b80d32bce8176eeb5b00ef3c7cc5594f59d0dc9e48a4744f6d380ffb7dd8a7f662c1487e78c6941dd35a8d17c29d2c6905a770da057b33ee6e7a03a228ba26b3b9d703548ee6b2a680ee570919d73055421056009ad7f97409b83769aa2be3cbde957d65ea0396d045ad838d993ead88f01649a9c0e868ca9ee0fdd32fe11d1d18fb37bb61537f83680a80aa67c3a7b1bc26025b0286042bc453c3487fabc7d173a4edc3cb978f55cbdcc8d84d85dbaff93970e623f235b40485ca6ffdea0d56c9b87879fbcbea0f1e3e3d70d6d804d4de7e09bfa292d63b68139abe327863c86f559c3933ddc3651fd6fe5552e1654b1bca74f0dd11734a38f4de120a13f5a28fa4a16bc886c47f2a1c47572ec37de795a9aa8c943ee5162219171c3f78603e3ffeec37c20fbbd1394eda40b7e9d8a6b863f1ba8bfe778bb98527aa6e65f8d192f1b50b6d9890ae25c1ffc8e0fa432fe93d4cc7cd80d2715722a8e65f811f20176bc92e5cb1845824fc21c65d654e2d5f7d2810bcaefd14b26fb183f48606343fc981b35133d50f125bdc32f7510a7bb866b9f7d57c393ea253834ca0726e00640ebf77cffcd343dd203946443b16f59d43e59dff2e35701bc5852fafa68c03d486e2a4a65a0ef69fe29931828d5ba94ce954f3b21b493db"}) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00000fff0000000000000000000000000000000000000000e0e515320000000002008801260001000000640000000001", 0x30}]) 03:34:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='maps\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) writev(r0, &(0x7f0000001400), 0x0) 03:34:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='maps\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) writev(r0, &(0x7f0000001400), 0x0) 03:34:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x2001000000000002, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x0, 0x3, [0x8, 0x0, 0x0]}, &(0x7f00000002c0)=0xe) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x264, 0x3ef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8]}, 0x75, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x1d, r3}) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x0, 0x0, 0x100000000, 0x1c0270, r3}) r5 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="6c80dee22064ecc2e1a0f2bc4df55a7f4ee9b0d78c9e3fb08476e7c97b207cc059cb1ff0c49f962332426fa0b1501af6d8dfeb908d5536ea067a5659b04086344f5d2f19", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000300)=0xb) r6 = semget(0x3, 0x0, 0x2e2) semtimedop(r6, &(0x7f00000001c0)=[{0x4, 0x80, 0x1000}, {0x3, 0x1, 0x800}, {0x7, 0x6, 0x1000}, {0x0, 0x80000000, 0x800}, {0x7, 0x100000001, 0x1000}, {0x1, 0xffffffffffffff00, 0x800}, {0x7, 0x845}, {0x6, 0x1, 0x1800}], 0x8, &(0x7f0000000200)) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r7 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r7, 0x80045300, &(0x7f0000000000)) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8, 0x3, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000002c40)) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x5ffc, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000080)="c8c3822642625609b35166ff86bece4e45ba6e005099e00c82bdac3b201a408072834a9bbed1b4a4e84e0d066b072850e40603039b89d9074cb408aa9e52279ed93cbd8582417995a1ca953b93d0efcc01dc97feffed33aa51ab2919cf77737c30201fa2d8c34f498f8b3da940010c474919ca49da47085eb42c36ff67aa1c0c02cef0f5fafc1f6f59b35f0e59016ffcac91f68dae5fa3cc0248fc776124e52125c11bc7282eab83fd9dbc4763e52e94a2bc634e7f29e1c73d153af853d8", 0xbe, 0x8}], 0x20000, &(0x7f0000000200)=ANY=[]) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x111000, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r8, 0x84, 0x13, &(0x7f0000000280)=0x5, 0x4) 03:34:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='maps\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) writev(r0, &(0x7f0000001400), 0x0) 03:34:54 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) mmap(&(0x7f0000000000/0xaab000)=nil, 0xaab000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt(r0, 0x800000000000010d, 0x2, &(0x7f000031df55)=""/4, &(0x7f0000b91000)=0x4) 03:34:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x80300) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000100)=""/202, &(0x7f0000000240)=0xca) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000280)={"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"}) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00000fff0000000000000000000000000000000000000000e0e515320000000002008801260001000000640000000001", 0x30}]) 03:34:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='maps\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) writev(r0, &(0x7f0000001400), 0x0) 03:34:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x2001000000000002, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x0, 0x3, [0x8, 0x0, 0x0]}, &(0x7f00000002c0)=0xe) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x264, 0x3ef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8]}, 0x75, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x1d, r3}) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x0, 0x0, 0x100000000, 0x1c0270, r3}) r5 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="6c80dee22064ecc2e1a0f2bc4df55a7f4ee9b0d78c9e3fb08476e7c97b207cc059cb1ff0c49f962332426fa0b1501af6d8dfeb908d5536ea067a5659b04086344f5d2f19", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000300)=0xb) r6 = semget(0x3, 0x0, 0x2e2) semtimedop(r6, &(0x7f00000001c0)=[{0x4, 0x80, 0x1000}, {0x3, 0x1, 0x800}, {0x7, 0x6, 0x1000}, {0x0, 0x80000000, 0x800}, {0x7, 0x100000001, 0x1000}, {0x1, 0xffffffffffffff00, 0x800}, {0x7, 0x845}, {0x6, 0x1, 0x1800}], 0x8, &(0x7f0000000200)) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r7 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r7, 0x80045300, &(0x7f0000000000)) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8, 0x3, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000002c40)) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x5ffc, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000080)="c8c3822642625609b35166ff86bece4e45ba6e005099e00c82bdac3b201a408072834a9bbed1b4a4e84e0d066b072850e40603039b89d9074cb408aa9e52279ed93cbd8582417995a1ca953b93d0efcc01dc97feffed33aa51ab2919cf77737c30201fa2d8c34f498f8b3da940010c474919ca49da47085eb42c36ff67aa1c0c02cef0f5fafc1f6f59b35f0e59016ffcac91f68dae5fa3cc0248fc776124e52125c11bc7282eab83fd9dbc4763e52e94a2bc634e7f29e1c73d153af853d8", 0xbe, 0x8}], 0x20000, &(0x7f0000000200)=ANY=[]) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x111000, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r8, 0x84, 0x13, &(0x7f0000000280)=0x5, 0x4) 03:34:54 executing program 5: clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:54 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat6\x00') lseek(r0, 0x54, 0x0) 03:34:54 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000380)='cpuset.mem_exclusive\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x2, 0x12) 03:34:54 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0xf0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002700)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002680)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a027c4e1ce582d0000000000d96736e60641ff0f1837370f38211ac4c190aad9f28fc90f194120c461781337e5e50f2e1ac4010d64ac1e5d31a3b70ac6cef6cef62dd541029fc402c18c26") 03:34:54 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:54 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000380)='cpuset.mem_exclusive\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x2, 0x12) 03:34:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x1fffffff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) 03:34:54 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000380)='cpuset.mem_exclusive\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x2, 0x12) 03:34:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) 03:34:54 executing program 2: prctl$setname(0x1d, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000440)={0x18}, 0x18) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000000600)=@xdp, &(0x7f0000000680)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'vcan0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000800)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'ip6_vti0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000880), &(0x7f00000008c0)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in6=@dev, @in=@multicast1}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000bc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14, 0x0) 03:34:54 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000380)='cpuset.mem_exclusive\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x2, 0x12) 03:34:55 executing program 1: chmod(&(0x7f0000000180)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)) getresuid(&(0x7f00000001c0), &(0x7f0000000280), &(0x7f0000000240)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000031c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xffffff1e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000003580)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000000640), &(0x7f0000000600), &(0x7f0000000340)) msgget$private(0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000003c40)='./file0\x00', &(0x7f0000003c80)) getresgid(&(0x7f0000003d00), &(0x7f0000003d40), &(0x7f0000003d80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/209) syz_execute_func(&(0x7f0000000580)="428055a0636969ef69dc00d9c421a05d2f0f8b00000000f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41df660fba7bfefe0f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:55 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:55 executing program 5: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000840), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:55 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000000)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(0xffffffffffffffff, &(0x7f000000a000), 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x2) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) get_robust_list(0x0, &(0x7f0000000200)=&(0x7f00000001c0)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f0000000240)=0x18) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f00000000c0)) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0xc3, &(0x7f0000000100)=""/195}, 0x48) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) pipe2(&(0x7f0000000000), 0x0) 03:34:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000080)}, 0x0) 03:34:55 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:55 executing program 2: clock_gettime(0x7fffffffffffffc, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:56 executing program 1: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) getuid() getgroups(0x0, &(0x7f0000000a80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c40)) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:56 executing program 5: clone(0x10000200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:56 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:56 executing program 4: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000600)=""/204) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) syz_execute_func(&(0x7f0000000700)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:56 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6") ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037") 03:34:56 executing program 4: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000600)=""/204) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) syz_execute_func(&(0x7f0000000700)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:56 executing program 2: rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='./file0\x00') clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000001c0)) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000007c0)=""/115) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000740)=0x10) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:34:57 executing program 4: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000600)=""/204) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) syz_execute_func(&(0x7f0000000700)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000007c0)='./control\x00', 0x0) rt_sigaction(0x10, &(0x7f00000002c0)={0x0, {0x100000000}, 0x0, 0x0}, &(0x7f0000000300), 0x8, &(0x7f0000000340)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x501042, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x8, 0x1) getpeername(r0, &(0x7f0000000380)=@hci={0x1f, 0x0}, &(0x7f0000000400)=0x80) syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x80002) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f00000000c0)={@remote, @multicast2}, &(0x7f00000004c0)=0xc) faccessat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) r4 = memfd_create(&(0x7f0000000440)='/dev/snd/seq\x00', 0x1) bind$can_raw(r4, &(0x7f0000000480)={0x1d, r3}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x1ba, &(0x7f00000022c0)}}, {{0x0, 0x0, &(0x7f00000026c0), 0x0, &(0x7f0000002700)}}], 0x75a, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 03:34:57 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:57 executing program 4: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000600)=""/204) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) syz_execute_func(&(0x7f0000000700)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00009f2000)={&(0x7f000007cff4), 0xc, &(0x7f0000226000)={&(0x7f0000000000)={0x14, 0x18, 0x2ff, 0x0, 0x0, {0xa, 0x0, 0x4b9}}, 0x14}}, 0x0) 03:34:57 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x3, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4032, 0x0, @local={0xac, 0x70}, @dev, {[@timestamp={0xffffa888, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 03:34:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") unshare(0x0) r1 = socket(0x1e, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)) 03:34:57 executing program 3: msgget(0xffffffffffffffff, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) fstat(0xffffffffffffff9c, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getresgid(&(0x7f00000002c0), &(0x7f00000003c0), &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) getpgid(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000640)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000580)) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000ac0)=ANY=[], 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:57 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x6013, r0, 0x81000000) 03:34:57 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x101240, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, 0x0, r1) 03:34:57 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)="2f70726f632f7379732f6e65743416112b2f76732f657870070ef675f41e7a6972655f6e6f646573745f636f6e6e00", 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000ac0)=""/254, &(0x7f0000000bc0)=0xfe) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000002c0)) select(0x40, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000009c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)='9p\x00', 0x0, &(0x7f0000000c80)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xe8) syz_execute_func(&(0x7f0000000200)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 03:34:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x101240, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, 0x0, r1) 03:34:58 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffa) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003480)={{{@in6=@loopback, @in=@remote}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000003580)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000035c0)) geteuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003600)) getuid() getgroups(0x0, &(0x7f0000003640)) gettid() syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") [ 476.529662] xt_connbytes: cannot load conntrack support for proto=7 [ 476.544077] xt_connbytes: Forcing CT accounting to be enabled 03:34:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x101240, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, 0x0, r1) 03:34:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0x0) getpgid(0x0) 03:34:58 executing program 5: ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0x14) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:58 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x4000000000001004}]}, 0x10) sendto$inet6(r1, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:34:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x101240, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, 0x0, r1) 03:34:58 executing program 3: keyctl$set_reqkey_keyring(0x7, 0xfffffffc) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) 03:34:58 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffa) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003480)={{{@in6=@loopback, @in=@remote}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000003580)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000035c0)) geteuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003600)) getuid() getgroups(0x0, &(0x7f0000003640)) gettid() syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:58 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x2f8, &(0x7f0000000300)}, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000480)=0xe8) getegid() mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='fuseblk\x00', 0x0, &(0x7f0000000800)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:34:58 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffa) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003480)={{{@in6=@loopback, @in=@remote}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000003580)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000035c0)) geteuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003600)) getuid() getgroups(0x0, &(0x7f0000003640)) gettid() syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:59 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffa) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003480)={{{@in6=@loopback, @in=@remote}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000003580)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000035c0)) geteuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003600)) getuid() getgroups(0x0, &(0x7f0000003640)) gettid() syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:59 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x4000000000001004}]}, 0x10) sendto$inet6(r1, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:34:59 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x4000000000001004}]}, 0x10) sendto$inet6(r1, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:34:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)={'broute\x00', 0x0, 0x0, 0x5c, [], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=""/92}, &(0x7f0000000100)=0x78) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x4) clone(0x4002102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x55f5}, 0x14) 03:34:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)={'broute\x00', 0x0, 0x0, 0x5c, [], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=""/92}, &(0x7f0000000100)=0x78) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x4) clone(0x4002102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x55f5}, 0x14) 03:34:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)={'broute\x00', 0x0, 0x0, 0x5c, [], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=""/92}, &(0x7f0000000100)=0x78) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x4) clone(0x4002102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x55f5}, 0x14) 03:34:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r1, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, &(0x7f0000d31ff0), &(0x7f00007adff0)={0x77359400}, 0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r3, 0x0) read(r4, &(0x7f0000000280)=""/1, 0x1) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:34:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)={'broute\x00', 0x0, 0x0, 0x5c, [], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=""/92}, &(0x7f0000000100)=0x78) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x4) clone(0x4002102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x55f5}, 0x14) 03:34:59 executing program 3: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000004c0)={0x7}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in=@remote, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000740)=0xe8) ioctl$void(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 03:34:59 executing program 4: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = socket$kcm(0x29, 0x2, 0x0) unshare(0x400) getsockopt$sock_linger(r1, 0x1, 0x31, &(0x7f0000000400), &(0x7f0000000440)=0x8) 03:34:59 executing program 5: getpgid(0x0) getpgid(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000140)) prctl$intptr(0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) delete_module(&(0x7f0000000040)='(}\x00', 0x0) pipe(&(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@local}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40), &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@loopback}, &(0x7f0000001b00)=0x14) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000840)=ANY=[]) socket$inet6(0xa, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000280)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={&(0x7f00000001c0), 0xc, &(0x7f00000bfff0)={&(0x7f0000000300)=ANY=[]}}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 03:34:59 executing program 4: init_module(&(0x7f0000000140)='nodevselinux.user\x00', 0x12, &(0x7f00000001c0)='keyring\x00') socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0), 0x3ffffffffffffc8, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='system!\x00systeo\x00'}, 0xfffffea0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) request_key(&(0x7f00000006c0)='pkcs7_test\x00', &(0x7f0000000900), &(0x7f0000000b00)='*$\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001780)={{{@in, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000700)=0xfff6) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001880)) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in=@multicast2, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000019c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007dc0)={{{@in=@loopback, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000008440)=0xfffffffffffffeab) getegid() seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:59 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x4000000000001004}]}, 0x10) sendto$inet6(r1, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:35:00 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x4000000000001004}]}, 0x10) sendto$inet6(r1, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:35:00 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x4000000000001004}]}, 0x10) sendto$inet6(r1, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:35:00 executing program 1: shmget(0x2, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) eventfd(0x0) fchdir(0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14, 0x0) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_addrs=@hci}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000bc0)={@dev, @broadcast}, &(0x7f0000000c00)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000008c00), 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008d40)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000008e40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000008e80)={{{@in=@broadcast, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000008f80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000009280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000092c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009300), &(0x7f0000009340)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f000000bac0), 0x0, 0x0, &(0x7f000000bb40)={0x77359400}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000bd80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bdc0)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f000000be00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000be40)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:00 executing program 3: memfd_create(&(0x7f0000000080)='asymmetric\x00', 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000140)={'security\x00', 0x2, [{}, {}]}, 0x48) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0610fef69dc0fc201e5eeeeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe9f7f") memfd_create(&(0x7f0000000640)='\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:35:00 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x40000000000005, 0x0) ioctl$sock_ifreq(r0, 0x8993, &(0x7f0000000000)={'eql\x00', @ifru_flags}) 03:35:00 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x82a42, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:00 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x4000000000001004}]}, 0x10) sendto$inet6(r1, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:35:00 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fchmod(0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x20, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0, &(0x7f0000000a80)={0x0, 0x1c9c380}) keyctl$setperm(0x13, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flock(0xffffffffffffffff, 0x0) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380), 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[]}}, 0x0) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) fstat(0xffffffffffffffff, &(0x7f0000001140)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, 0xe8) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000580)={'syz1'}, 0x4) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/net\x00') getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000440), &(0x7f0000000600), 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000340)) 03:35:00 executing program 5: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f0000024000), 0xc, &(0x7f0000023ff0)={&(0x7f0000000240)={0x24, 0x30, 0xaff, 0x0, 0x0, {0x3}, [@nested={0x20024000, 0x0, [@typed={0xc, 0x1, @u64}]}]}, 0x24}}, 0x0) 03:35:01 executing program 5: sync() eventfd2(0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f00000001c0)=0x80, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300), 0x12) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) mremap(&(0x7f0000ff8000/0x8000)=nil, 0x8000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 03:35:01 executing program 0: getuid() socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) syz_open_dev$rtc(&(0x7f00000003c0)='/dev/rtc#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/sequencer\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f000000af00)) getgid() openat$ion(0xffffffffffffff9c, &(0x7f000000af40)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f000000af80)='/dev/amidi#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f000000afc0)='/dev/snapshot\x00', 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) socket$inet_dccp(0x2, 0x6, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f000000b000)='/dev/urandom\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f000000b040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f000000b0c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f000000b100)='ns/pid_for_children\x00') accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f000000b140), &(0x7f000000b1c0)=0x60, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f000000b200)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f000000b240)) pipe(&(0x7f000000b280)) pipe2(&(0x7f000000b640), 0x0) syz_open_dev$sg(&(0x7f000000b300)='/dev/sg#\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f000000b340), 0x0) syz_open_dev$usb(&(0x7f000000b380)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f000000b3c0), 0x8) syz_open_dev$usbmon(&(0x7f000000b400)='/dev/usbmon#\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$alg(0x26, 0x5, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) socket$inet_smc(0x2b, 0x1, 0x0) socket$l2tp(0x18, 0x1, 0x1) accept4$inet(0xffffffffffffffff, &(0x7f000000b440)={0x2, 0x0, @rand_addr}, &(0x7f000000b480)=0x10, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) sendmsg$netlink(0xffffffffffffffff, &(0x7f000000b600)={&(0x7f00000000c0), 0xc, &(0x7f000000ae80), 0x0, &(0x7f000000b4c0)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:01 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f00000000c0)) 03:35:01 executing program 5: ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:01 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x82a42, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:01 executing program 1: mount$9p_rdma(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x0, &(0x7f0000000280)={'trans=rdma,', {'port'}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:35:01 executing program 3: getgroups(0x0, &(0x7f0000000300)) getgid() getgid() socket$key(0xf, 0x3, 0x2) getpgrp(0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x2710}}, 0x0) setresgid(0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d060e0a00000f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:35:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a26c8079a613c6e715070") bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="00000000000004000c"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x7, 0x0, 0xa}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) 03:35:02 executing program 2: clock_getres(0xffffffffffffffff, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") 03:35:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) fdatasync(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='status\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000173, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000000240)=""/195, 0xc3}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000340)=""/147, 0x93}], 0x3, 0x0) 03:35:02 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x82a42, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:02 executing program 1: syz_emit_ethernet(0x14, &(0x7f00000c5fe8)={@local, @random="1ae230c0b61f", [], {@generic={0x8863, "94a7030000e8"}}}, &(0x7f0000b0c000)={0x0, 0xfffffffffffffffd, [0x0, 0x311]}) 03:35:02 executing program 1: syz_emit_ethernet(0x14, &(0x7f00000c5fe8)={@local, @random="1ae230c0b61f", [], {@generic={0x8863, "94a7030000e8"}}}, &(0x7f0000b0c000)={0x0, 0xfffffffffffffffd, [0x0, 0x311]}) 03:35:03 executing program 0: getuid() socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) syz_open_dev$rtc(&(0x7f00000003c0)='/dev/rtc#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/sequencer\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f000000af00)) getgid() openat$ion(0xffffffffffffff9c, &(0x7f000000af40)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f000000af80)='/dev/amidi#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f000000afc0)='/dev/snapshot\x00', 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) socket$inet_dccp(0x2, 0x6, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f000000b000)='/dev/urandom\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f000000b040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f000000b0c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f000000b100)='ns/pid_for_children\x00') accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f000000b140), &(0x7f000000b1c0)=0x60, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f000000b200)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f000000b240)) pipe(&(0x7f000000b280)) pipe2(&(0x7f000000b640), 0x0) syz_open_dev$sg(&(0x7f000000b300)='/dev/sg#\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f000000b340), 0x0) syz_open_dev$usb(&(0x7f000000b380)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f000000b3c0), 0x8) syz_open_dev$usbmon(&(0x7f000000b400)='/dev/usbmon#\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$alg(0x26, 0x5, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) socket$inet_smc(0x2b, 0x1, 0x0) socket$l2tp(0x18, 0x1, 0x1) accept4$inet(0xffffffffffffffff, &(0x7f000000b440)={0x2, 0x0, @rand_addr}, &(0x7f000000b480)=0x10, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) sendmsg$netlink(0xffffffffffffffff, &(0x7f000000b600)={&(0x7f00000000c0), 0xc, &(0x7f000000ae80), 0x0, &(0x7f000000b4c0)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:03 executing program 1: syz_emit_ethernet(0x14, &(0x7f00000c5fe8)={@local, @random="1ae230c0b61f", [], {@generic={0x8863, "94a7030000e8"}}}, &(0x7f0000b0c000)={0x0, 0xfffffffffffffffd, [0x0, 0x311]}) 03:35:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x1000011, 0x31, 0xffffffffffffffff, 0x0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000640)) 03:35:03 executing program 2: futex(&(0x7f0000000800), 0x0, 0x0, &(0x7f00000007c0)={0x0, 0x989680}, &(0x7f0000000180), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) memfd_create(&(0x7f0000000140)='){\x00', 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000cc0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) getresuid(&(0x7f0000003140), &(0x7f0000000dc0), &(0x7f0000000e00)) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getgid() getpid() getgroups(0x0, &(0x7f0000001500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001540)='){\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000056c0)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() fcntl$getown(0xffffffffffffffff, 0x9) geteuid() lstat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) fstat(0xffffffffffffffff, &(0x7f0000001900)) stat(&(0x7f0000001980)='./file0\x00', &(0x7f00000019c0)) getpgid(0xffffffffffffffff) stat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003400)) fstat(0xffffffffffffffff, &(0x7f0000003440)) stat(&(0x7f00000034c0)='./file0\x00', &(0x7f0000003500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) 03:35:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) fdatasync(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='status\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000173, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000000240)=""/195, 0xc3}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000340)=""/147, 0x93}], 0x3, 0x0) 03:35:03 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x82a42, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:03 executing program 1: syz_emit_ethernet(0x14, &(0x7f00000c5fe8)={@local, @random="1ae230c0b61f", [], {@generic={0x8863, "94a7030000e8"}}}, &(0x7f0000b0c000)={0x0, 0xfffffffffffffffd, [0x0, 0x311]}) 03:35:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) fdatasync(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='status\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000173, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000000240)=""/195, 0xc3}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000340)=""/147, 0x93}], 0x3, 0x0) 03:35:04 executing program 1: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f00004fd000), 0x4) setsockopt$inet_int(r0, 0x0, 0x40000000000c8, &(0x7f0000000080), 0x4) 03:35:04 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "aabc7d", 0x44, 0x0, 0x0, @local, @ipv4={[], [], @dev}, {[], @gre}}}}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0876969ef69dc00d9f0008f00008020c421fa7fb432322333331f1c3728372838211ac4c19086d9f28fc92665984e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706c4c1c05659009f4b") 03:35:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) fdatasync(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='status\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000173, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000000240)=""/195, 0xc3}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000340)=""/147, 0x93}], 0x3, 0x0) 03:35:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) fdatasync(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='status\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000173, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000000240)=""/195, 0xc3}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000340)=""/147, 0x93}], 0x3, 0x0) 03:35:04 executing program 0: getuid() socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) syz_open_dev$rtc(&(0x7f00000003c0)='/dev/rtc#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/sequencer\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f000000af00)) getgid() openat$ion(0xffffffffffffff9c, &(0x7f000000af40)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f000000af80)='/dev/amidi#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f000000afc0)='/dev/snapshot\x00', 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) socket$inet_dccp(0x2, 0x6, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f000000b000)='/dev/urandom\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f000000b040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f000000b0c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f000000b100)='ns/pid_for_children\x00') accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f000000b140), &(0x7f000000b1c0)=0x60, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f000000b200)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f000000b240)) pipe(&(0x7f000000b280)) pipe2(&(0x7f000000b640), 0x0) syz_open_dev$sg(&(0x7f000000b300)='/dev/sg#\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f000000b340), 0x0) syz_open_dev$usb(&(0x7f000000b380)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f000000b3c0), 0x8) syz_open_dev$usbmon(&(0x7f000000b400)='/dev/usbmon#\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$alg(0x26, 0x5, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) socket$inet_smc(0x2b, 0x1, 0x0) socket$l2tp(0x18, 0x1, 0x1) accept4$inet(0xffffffffffffffff, &(0x7f000000b440)={0x2, 0x0, @rand_addr}, &(0x7f000000b480)=0x10, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) sendmsg$netlink(0xffffffffffffffff, &(0x7f000000b600)={&(0x7f00000000c0), 0xc, &(0x7f000000ae80), 0x0, &(0x7f000000b4c0)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:04 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0xf0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002700)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002680)}, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000200)) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000700)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000016c0)=""/4096, &(0x7f0000000400)=0xfffffffffffffcbb) splice(0xffffffffffffffff, &(0x7f0000000380), 0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000240)=""/231) syz_execute_func(&(0x7f0000000640)="428055a027c4e1ce582d0000000000d96736e60641ff0f1837370f38211ac4c190aad9f28fc90f194120c461781337e5e50f2e1ac4010d64ac1e5d31a3b70ac6cef6cef62dd541029fc402c18c26") ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000600)={&(0x7f0000000500)=ANY=[]}}, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/16) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000500), 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000540)) sendto(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, &(0x7f0000000740)=@nfc, 0x80) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000880)) clock_gettime(0x0, &(0x7f0000000ec0)) write$evdev(0xffffffffffffffff, &(0x7f0000000380), 0x0) getpgrp(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000e80)) getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b00)={{{@in6, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000c00)=0xe8) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000cc0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000800), 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000f40)=ANY=[]}, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000e00)=""/126, 0x7e, 0x0) 03:35:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) socket(0x0, 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0x0) splice(0xffffffffffffffff, &(0x7f0000000080), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) inotify_init1(0x0) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000fa4000)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100), 0x0) 03:35:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) fdatasync(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='status\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000173, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000000240)=""/195, 0xc3}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000340)=""/147, 0x93}], 0x3, 0x0) 03:35:05 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "aabc7d", 0x44, 0x0, 0x0, @local, @ipv4={[], [], @dev}, {[], @gre}}}}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0876969ef69dc00d9f0008f00008020c421fa7fb432322333331f1c3728372838211ac4c19086d9f28fc92665984e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706c4c1c05659009f4b") 03:35:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) fdatasync(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='status\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000173, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000000240)=""/195, 0xc3}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000340)=""/147, 0x93}], 0x3, 0x0) 03:35:05 executing program 0: getuid() socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) syz_open_dev$rtc(&(0x7f00000003c0)='/dev/rtc#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/sequencer\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f000000af00)) getgid() openat$ion(0xffffffffffffff9c, &(0x7f000000af40)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f000000af80)='/dev/amidi#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f000000afc0)='/dev/snapshot\x00', 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) socket$inet_dccp(0x2, 0x6, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f000000b000)='/dev/urandom\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f000000b040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f000000b0c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f000000b100)='ns/pid_for_children\x00') accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f000000b140), &(0x7f000000b1c0)=0x60, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f000000b200)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f000000b240)) pipe(&(0x7f000000b280)) pipe2(&(0x7f000000b640), 0x0) syz_open_dev$sg(&(0x7f000000b300)='/dev/sg#\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f000000b340), 0x0) syz_open_dev$usb(&(0x7f000000b380)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f000000b3c0), 0x8) syz_open_dev$usbmon(&(0x7f000000b400)='/dev/usbmon#\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$alg(0x26, 0x5, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) socket$inet_smc(0x2b, 0x1, 0x0) socket$l2tp(0x18, 0x1, 0x1) accept4$inet(0xffffffffffffffff, &(0x7f000000b440)={0x2, 0x0, @rand_addr}, &(0x7f000000b480)=0x10, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) sendmsg$netlink(0xffffffffffffffff, &(0x7f000000b600)={&(0x7f00000000c0), 0xc, &(0x7f000000ae80), 0x0, &(0x7f000000b4c0)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:05 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0xf0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002700)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002680)}, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000200)) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000700)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000016c0)=""/4096, &(0x7f0000000400)=0xfffffffffffffcbb) splice(0xffffffffffffffff, &(0x7f0000000380), 0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000240)=""/231) syz_execute_func(&(0x7f0000000640)="428055a027c4e1ce582d0000000000d96736e60641ff0f1837370f38211ac4c190aad9f28fc90f194120c461781337e5e50f2e1ac4010d64ac1e5d31a3b70ac6cef6cef62dd541029fc402c18c26") ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000600)={&(0x7f0000000500)=ANY=[]}}, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/16) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000500), 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000540)) sendto(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, &(0x7f0000000740)=@nfc, 0x80) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000880)) clock_gettime(0x0, &(0x7f0000000ec0)) write$evdev(0xffffffffffffffff, &(0x7f0000000380), 0x0) getpgrp(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000e80)) getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b00)={{{@in6, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000c00)=0xe8) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000cc0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000800), 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000f40)=ANY=[]}, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000e00)=""/126, 0x7e, 0x0) 03:35:05 executing program 2: migrate_pages(0x0, 0x2, &(0x7f0000001340), &(0x7f0000000140)=0x1) gettid() seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000015c0)="428055a0636969ef69dc00d9c421a05d2f8a20c463216c6fab00c3f6cf000fcdae300f3821c4234d5cf0cbc07f41dfe0400f01efe5e5430f401ae400001a1a01460f01ee45dfde9f") 03:35:05 executing program 5: syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x2}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000100)) 03:35:06 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f00000000c0), &(0x7f0000000d80), &(0x7f0000000dc0)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001180)) stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000240)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000017c0)=0xe8) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) getpgid(0x0) 03:35:06 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f0000000000)='+nodev-usercgroup%\x00') syz_open_dev$admmidi(&(0x7f0000000980)='/dev/admmidi#\x00', 0x0, 0x0) getresuid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) socket$inet(0x2, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000eed000), 0x10) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000440), 0x4) syz_emit_ethernet(0x0, &(0x7f0000000540)=ANY=[], 0x0) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000b40)={0xa0}, 0xa0) 03:35:06 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "aabc7d", 0x44, 0x0, 0x0, @local, @ipv4={[], [], @dev}, {[], @gre}}}}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0876969ef69dc00d9f0008f00008020c421fa7fb432322333331f1c3728372838211ac4c19086d9f28fc92665984e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706c4c1c05659009f4b") 03:35:06 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000015c0)="240000005a001f00ff010002010002080002800100000000000000000000000000000000", 0x24) [ 484.727247] netlink: 16 bytes leftover after parsing attributes in process `syz-executor5'. 03:35:06 executing program 5: semget(0xffffffffffffffff, 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) fstat(0xffffffffffffff9c, &(0x7f00000001c0)) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)) getegid() semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000400)=0x388) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000800)) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:06 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0xf0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002700)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002680)}, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000200)) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000700)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000016c0)=""/4096, &(0x7f0000000400)=0xfffffffffffffcbb) splice(0xffffffffffffffff, &(0x7f0000000380), 0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000240)=""/231) syz_execute_func(&(0x7f0000000640)="428055a027c4e1ce582d0000000000d96736e60641ff0f1837370f38211ac4c190aad9f28fc90f194120c461781337e5e50f2e1ac4010d64ac1e5d31a3b70ac6cef6cef62dd541029fc402c18c26") ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000600)={&(0x7f0000000500)=ANY=[]}}, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/16) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000500), 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000540)) sendto(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, &(0x7f0000000740)=@nfc, 0x80) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000880)) clock_gettime(0x0, &(0x7f0000000ec0)) write$evdev(0xffffffffffffffff, &(0x7f0000000380), 0x0) getpgrp(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000e80)) getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b00)={{{@in6, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000c00)=0xe8) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000cc0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000800), 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000f40)=ANY=[]}, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000e00)=""/126, 0x7e, 0x0) 03:35:06 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) 03:35:06 executing program 2: times(&(0x7f0000000200)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) prctl$setendian(0x14, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000380)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000500)) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fb4175450f2e1a67f20f2cedc4a1c173dfdcf08024030842ec4b") 03:35:06 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f00008da000)={{0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, [0xfe]}, {0x0, @random="4224458fe6c2"}, 0x0, {0x2, 0x0, @multicast1}}) [ 485.232981] QAT: Stopping all acceleration devices. 03:35:06 executing program 0: syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000200)={'team_slave_0\x00', &(0x7f0000000140)=@ethtool_channels}) clock_gettime(0x0, &(0x7f0000000440)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000940)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000005c0)=""/96) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000080), &(0x7f00000002c0)=0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) getgid() ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000280)='bpq0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:06 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='cpu&3|?\x00\x00') 03:35:07 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "aabc7d", 0x44, 0x0, 0x0, @local, @ipv4={[], [], @dev}, {[], @gre}}}}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0876969ef69dc00d9f0008f00008020c421fa7fb432322333331f1c3728372838211ac4c19086d9f28fc92665984e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706c4c1c05659009f4b") 03:35:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet(0x10, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)}, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x1c) gettid() ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_to_team\x00', &(0x7f0000000140)=@ethtool_gstrings}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f00000016c0), 0x0, &(0x7f0000001780)) 03:35:07 executing program 5: keyctl$set_reqkey_keyring(0x3, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x14, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0x10, &(0x7f0000000240)={&(0x7f0000000200)=@can={{}, 0x0, 0x0, 0x0, 0x0, "b02ee92fca294902"}, 0x10}}, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='rdma.current\x00', 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f00000002c0)=""/32) syz_execute_func(&(0x7f00000004c0)="428055a06b6969ef69dc00d99069203737c3397c2a51040f38211ac422f193b4df2d73c73941dfe02d2d0f0189efc42232f7ece54175457d0f2e1a1a01460f01ee31a3b786e2989fc42149f440e9") 03:35:07 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0xf0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002700)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002680)}, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000200)) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000700)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000016c0)=""/4096, &(0x7f0000000400)=0xfffffffffffffcbb) splice(0xffffffffffffffff, &(0x7f0000000380), 0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000240)=""/231) syz_execute_func(&(0x7f0000000640)="428055a027c4e1ce582d0000000000d96736e60641ff0f1837370f38211ac4c190aad9f28fc90f194120c461781337e5e50f2e1ac4010d64ac1e5d31a3b70ac6cef6cef62dd541029fc402c18c26") ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000600)={&(0x7f0000000500)=ANY=[]}}, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/16) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000500), 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000540)) sendto(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, &(0x7f0000000740)=@nfc, 0x80) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000880)) clock_gettime(0x0, &(0x7f0000000ec0)) write$evdev(0xffffffffffffffff, &(0x7f0000000380), 0x0) getpgrp(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000e80)) getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b00)={{{@in6, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000c00)=0xe8) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000cc0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000800), 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000f40)=ANY=[]}, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000e00)=""/126, 0x7e, 0x0) [ 485.951025] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 03:35:07 executing program 2: r0 = socket(0x11, 0x80a, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) bind(r0, &(0x7f0000000100)=@pptp, 0xffffff24) ptrace$setsig(0x4203, r1, 0x0, &(0x7f0000000040)) 03:35:07 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) semget(0xffffffffffffffff, 0xa000000, 0x0) 03:35:08 executing program 1: getpgrp(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) syz_open_dev$sndpcmc(&(0x7f00000005c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000740)=ANY=[], &(0x7f0000000680)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x20) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000480)) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000300)=""/89, 0x59, 0x0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random="bdc64c93b3b2"}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000500), &(0x7f0000000240)=0x20) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f00000003c0)) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280), 0x8) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000180)) write$P9_RRENAME(0xffffffffffffffff, &(0x7f00000004c0)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:35:08 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) semget(0xffffffffffffffff, 0xa000000, 0x0) 03:35:08 executing program 2: r0 = socket(0x11, 0x80a, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) bind(r0, &(0x7f0000000100)=@pptp, 0xffffff24) ptrace$setsig(0x4203, r1, 0x0, &(0x7f0000000040)) 03:35:08 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) semget(0xffffffffffffffff, 0xa000000, 0x0) 03:35:08 executing program 3: getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) getgroups(0x0, &(0x7f00000003c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getuid() lstat(&(0x7f0000000480)='./file0/file0/file0\x00', &(0x7f0000000b80)) stat(&(0x7f0000000c00)='./file0/file0/file0/file0\x00', &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) socket$unix(0x1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001340)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000001440)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@mcast1, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000001600)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000001ac0)=0xc) getgroups(0x0, &(0x7f0000001b00)) getuid() getgroups(0x0, &(0x7f0000001b40)) getresuid(&(0x7f0000001d80), &(0x7f0000001dc0), &(0x7f0000001e00)) lstat(&(0x7f0000001e40)='./file0/file0/file0\x00', &(0x7f0000001e80)) stat(&(0x7f0000001f00)='./file0/file0/file0\x00', &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002640)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000002740)=0xe8) stat(&(0x7f0000002780)='./file0/file0/file0\x00', &(0x7f00000027c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002840)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000002940)=0xe8) getgroups(0x0, &(0x7f0000002980)) syz_open_dev$rtc(&(0x7f00000029c0)='/dev/rtc#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a00)={{{@in=@remote, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000002b00)=0xe8) getgroups(0x0, &(0x7f0000002b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b80), &(0x7f0000002bc0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000004240)) getresgid(&(0x7f00000042c0), &(0x7f0000004300), &(0x7f0000004340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004380)={{{@in6=@local, @in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000004480)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000044c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004540)={{{@in=@local, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000004640)=0xe8) getegid() getresuid(&(0x7f0000004880), &(0x7f00000048c0), &(0x7f0000004900)) fstat(0xffffffffffffffff, &(0x7f0000004940)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000001100)='./file0/file0/file0\x00', 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:08 executing program 2: r0 = socket(0x11, 0x80a, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) bind(r0, &(0x7f0000000100)=@pptp, 0xffffff24) ptrace$setsig(0x4203, r1, 0x0, &(0x7f0000000040)) 03:35:08 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) semget(0xffffffffffffffff, 0xa000000, 0x0) 03:35:08 executing program 0: io_cancel(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f0000000100)) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x0) gettid() geteuid() stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000001580)) ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) syz_open_dev$usb(&(0x7f0000001600)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c00), &(0x7f0000001c40)=0xc) getresuid(&(0x7f0000001c80), &(0x7f0000001cc0), &(0x7f0000001d00)) fstat(0xffffffffffffffff, &(0x7f0000001d40)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004280)='cpuacct.usage_all\x00', 0x0, 0x0) accept4$nfc_llcp(0xffffffffffffff9c, 0x0, &(0x7f00000042c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004300)) geteuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000004340)) geteuid() stat(&(0x7f0000004380)='./file0\x00', &(0x7f00000043c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000047c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004800)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000004900)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000004940), &(0x7f0000004980)=0xc) memfd_create(&(0x7f00000049c0)='\\.%posix_acl_accesstrustedvmnet1\x00', 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000004a00)={0x0, 0x0, 0x0, 0xffffffffffffff9c}) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000004a40)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004a80)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000004b80)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004c40)={{{@in, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000004d40)=0xe8) getresgid(&(0x7f0000004d80), &(0x7f0000004dc0), &(0x7f0000004e00)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000005580)={{{@in6=@local, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000005680)=0xe8) getgid() gettid() fstat(0xffffffffffffffff, &(0x7f00000056c0)) fstat(0xffffffffffffffff, &(0x7f0000005740)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000057c0)={{{@in=@multicast1, @in6=@ipv4={[], [], @remote}}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000058c0)=0xe8) getresgid(&(0x7f0000005900), &(0x7f0000005940), &(0x7f0000005980)) gettid() lstat(&(0x7f00000059c0)='./file0\x00', &(0x7f0000005a00)) fstat(0xffffffffffffff9c, &(0x7f0000005a80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005b00)) geteuid() stat(&(0x7f0000005b40)='./file0\x00', &(0x7f0000005b80)) socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000005c00), &(0x7f0000005c40)=0xc) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000005c80), &(0x7f0000005cc0)=0xc) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000081c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008200)={{{@in=@local, @in6=@dev}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000008300)=0xe8) getresgid(&(0x7f0000008340), &(0x7f0000008380), &(0x7f00000083c0)) accept4$llc(0xffffffffffffffff, &(0x7f0000008400)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000008440)=0x10, 0x0) syz_open_dev$sndpcmp(&(0x7f0000008480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000084c0)='ns/pid_for_children\x00') syz_open_dev$usbmon(&(0x7f0000008500)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000008540)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) socket$kcm(0x29, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000008580)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f00000085c0)) fstat(0xffffffffffffffff, &(0x7f0000008640)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000086c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000008700), &(0x7f0000008740)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000008780)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000008a40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000008a80)={{{@in=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000008b80)=0xe8) getgroups(0x0, &(0x7f0000008bc0)) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000008c00)) getegid() syz_open_dev$sndmidi(&(0x7f0000008c80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:08 executing program 5: io_setup(0x2, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000340)={0x0, &(0x7f00000002c0)}) socket$inet_udplite(0x2, 0x2, 0x88) flock(0xffffffffffffffff, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@remote, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) getegid() chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) sched_getattr(0x0, &(0x7f0000000600), 0x30, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) setxattr$trusted_overlay_redirect(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.redirect\x00', &(0x7f00000005c0)='./file0\x00', 0x8, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000640), 0x10) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000380), 0x10) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:35:08 executing program 2: r0 = socket(0x11, 0x80a, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) bind(r0, &(0x7f0000000100)=@pptp, 0xffffff24) ptrace$setsig(0x4203, r1, 0x0, &(0x7f0000000040)) 03:35:08 executing program 2: pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) removexattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@known='trusted.syz\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000080)=0x185) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c8400f1837370f38211ac4c19086d9f28fd9410feefa4e2179fbe5e54175455d0f2e1a911a01660ff7f031a3b786e2989f7f") 03:35:08 executing program 4: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x101442) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)}) clock_gettime(0x0, &(0x7f0000000040)) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000002c0), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x18, &(0x7f0000000100)}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180), 0xc) seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000300)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f00000001c0)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), 0x8) syz_execute_func(&(0x7f0000000580)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac63192bb90101df28fc98fc9c4c179e06700fa4e2179fb4175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") socket$can_raw(0x1d, 0x3, 0x1) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000000), 0x1) 03:35:08 executing program 1: prctl$seccomp(0x2a, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000100)) ioperm(0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000300), &(0x7f00000003c0)=0x1c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:08 executing program 5: mremap(&(0x7f0000fff000/0x1000)=nil, 0x20000000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:35:09 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000700)}) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000500)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f0000000680)}) 03:35:09 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f00000003c0)) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f00000000c0)={0xf}, 0xf) link(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='./file0\x00') fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0xfffffffffffffd38, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000140)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@local, @multicast2}, &(0x7f0000000580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000600)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@remote}}, 0xe8) creat(&(0x7f00000002c0)='./file0\x00', 0x0) creat(&(0x7f0000000540)='./file0\x00', 0x0) getpgid(0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000480)) openat$ppp(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500), 0x8) creat(&(0x7f0000000640)='./file1/file0\x00', 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000015c0)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000000a000)={&(0x7f0000010ff4), 0xc, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}]}, 0x30}}, 0x0) 03:35:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000015c0)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000000a000)={&(0x7f0000010ff4), 0xc, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}]}, 0x30}}, 0x0) 03:35:09 executing program 4: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) 03:35:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000015c0)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000000a000)={&(0x7f0000010ff4), 0xc, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}]}, 0x30}}, 0x0) 03:35:09 executing program 5: unshare(0x0) syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000003200)) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001880)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000007c0)=""/115) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000740)=0x10) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001880)=ANY=[], &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001b80)="428055a0636969ef69dc00d9c421a05daf8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41df447ec461e55cb100008020e5e57d0ffc148314831a0946b10f0fee45dfde9f") 03:35:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000015c0)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000000a000)={&(0x7f0000010ff4), 0xc, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}]}, 0x30}}, 0x0) 03:35:09 executing program 1: creat(&(0x7f00000001c0)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in=@multicast1, @in6=@mcast2}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@dev, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000dc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000ec0)={@loopback, @local}, &(0x7f0000000f00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001040)={@local, @loopback}, &(0x7f0000001080)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000010c0)={@loopback, @loopback}, &(0x7f0000001100)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001140)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@local}}}, &(0x7f0000001240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000012c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001400)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001440)={0x0, @multicast2, @rand_addr}, &(0x7f0000001480)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000014c0), &(0x7f0000001500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001540)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000015c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001740)={@mcast1}, &(0x7f0000001780)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001900)={@broadcast, @multicast1}, &(0x7f0000001940)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a00)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000001b00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000004d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000004dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004e40)={@mcast1}, &(0x7f0000004e80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000007cc0), &(0x7f0000007d00)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000007d40)=@xdp, &(0x7f0000007dc0)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f0000007e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007e40)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a06b6969ef69dc00d99069203737c3397c44060f38211ad9ee64a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") [ 488.476331] binder_alloc: binder_alloc_mmap_handler: 15283 20001000-20004000 already mapped failed -16 [ 488.507044] binder: BINDER_SET_CONTEXT_MGR already set 03:35:10 executing program 2: futex(&(0x7f0000000040), 0x3, 0x80000020, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=@random={'trusted.', '\\[,em0}[keyringwlan1em0\x00'}, &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) gettid() pkey_alloc(0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000180)={0x0, 'rose0\x00'}, 0x18) fstat(0xffffffffffffffff, &(0x7f0000000880)) getgroups(0x0, &(0x7f0000000940)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) stat(&(0x7f0000000a40)='./file0/file0\x00', &(0x7f0000000a80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in, @in=@dev}}, {{@in=@loopback}}}, &(0x7f0000000c00)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in=@multicast1, @in6=@ipv4}}, {{}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) lstat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getuid() getgid() getuid() lstat(&(0x7f0000006800)='./file1\x00', &(0x7f0000006840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000068c0), &(0x7f0000006900)=0xc) stat(&(0x7f0000006940)='./file0\x00', &(0x7f0000006980)) stat(&(0x7f0000006b80)='./file0\x00', &(0x7f0000006bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000007280)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000072c0), &(0x7f0000007300)=0xc) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007340), &(0x7f0000007380)=0xc) getegid() getresuid(&(0x7f00000073c0), &(0x7f0000007400), &(0x7f0000007440)) getresgid(&(0x7f0000007480), &(0x7f00000074c0), &(0x7f0000007500)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007540)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007580)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000007680)=0xe8) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000076c0)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f00000077c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007800), &(0x7f0000007840)=0xc) getresuid(&(0x7f0000007c40), &(0x7f0000007c80), &(0x7f0000007cc0)) getgroups(0x0, &(0x7f0000007d00)) stat(&(0x7f0000007d40)='./file0\x00', &(0x7f0000007d80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007e00), &(0x7f0000007e40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008080)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000008180)=0xe8) lstat(&(0x7f00000081c0)='./file0\x00', &(0x7f0000008200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008280)={{{@in6, @in=@remote}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000008380)=0xe8) getgid() getuid() lstat(&(0x7f00000083c0)='./file0\x00', &(0x7f0000008400)) fstat(0xffffffffffffffff, &(0x7f000000a0c0)) getgroups(0x0, &(0x7f0000008500)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008540)={{{@in6=@remote, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000008640)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008680), &(0x7f00000086c0)=0xc) lstat(&(0x7f0000008700)='./file0\x00', &(0x7f0000008740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000087c0), &(0x7f0000008800)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008840)={{{@in, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000008940)=0xe8) lstat(&(0x7f0000008980)='./file0\x00', &(0x7f00000089c0)) lstat(&(0x7f0000009180)='./file0\x00', &(0x7f00000091c0)) getresgid(&(0x7f0000009240), &(0x7f0000009280), &(0x7f00000092c0)) stat(&(0x7f0000009300)='./file0\x00', &(0x7f0000009340)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:10 executing program 4: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) [ 488.540171] binder: 15283:15320 ioctl 40046207 0 returned -16 [ 488.553255] binder_alloc: 15283: binder_alloc_buf, no vma [ 488.594053] binder: 15283:15285 transaction failed 29189/-3, size 24-8 line 2970 [ 488.601061] binder: 15283:15322 Release 1 refcount change on invalid ref 1 ret -22 03:35:10 executing program 3: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) [ 488.709025] binder: send failed reply for transaction 6 to 15283:15284 [ 488.722977] binder: undelivered TRANSACTION_COMPLETE [ 488.746729] binder: undelivered TRANSACTION_ERROR: 29189 03:35:10 executing program 4: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) 03:35:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) sendto$inet6(r1, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) close(r1) 03:35:10 executing program 3: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) 03:35:10 executing program 4: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) 03:35:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f2000000b7050000230000006a0a00fe000000008500000036000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0xcf, &(0x7f0000000280), &(0x7f0000000380)=""/207}, 0x28) 03:35:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000001180)='threaded\x00', 0xfc9a) fallocate(r1, 0x11, 0x0, 0x10000) 03:35:11 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x770a, 0x0) 03:35:11 executing program 3: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) 03:35:11 executing program 5: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000000)=@setneightbl={0x1c, 0x43, 0x301, 0x0, 0x0, {0xa}, [@NDTA_NAME={0x8, 0x1, '\x00'}]}, 0x1c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") 03:35:11 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e00000000040004000000e90000000c0000001000000014000003f8df0000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000140)) 03:35:11 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x770a, 0x0) 03:35:11 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000000380), 0x371) recvmsg(r0, &(0x7f0000003f00)={&(0x7f0000003d40)=@nfc, 0x80, &(0x7f0000003e80), 0x0, &(0x7f0000003ec0)=""/19, 0x13}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000240)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000680)}, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in={0xa, 0x4e23, @remote}, 0x80, &(0x7f0000000cc0), 0x0, &(0x7f0000000140)}, 0x0) recvmsg(r0, &(0x7f0000002c00)={0x0, 0x0, &(0x7f0000002bc0), 0x0, &(0x7f0000000500)=""/219, 0xdb}, 0x20002020) 03:35:11 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x20000270, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)="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", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f0000000080), &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10) setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4) inotify_rm_watch(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) lstat(&(0x7f00000015c0)='./file0/file0\x00', &(0x7f0000001600)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001d00)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001d40)) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000001dc0), &(0x7f0000001e00), &(0x7f0000001e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f40)={{{@in=@local, @in=@multicast1}}, {{@in6=@ipv4}, 0x0, @in=@loopback}}, &(0x7f0000002040)=0xe8) getgroups(0x0, &(0x7f0000002080)) getpgrp(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003480)) geteuid() fstat(0xffffffffffffffff, &(0x7f00000034c0)) gettid() 03:35:11 executing program 5: mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000000140)=""/4096) syz_emit_ethernet(0x0, &(0x7f00000012c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") pipe2$9p(&(0x7f0000000080), 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000011c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000001180)) mincore(&(0x7f0000ffb000/0x1000)=nil, 0x1000, &(0x7f0000001240)=""/4096) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001140)='/dev/hwrng\x00', 0x0, 0x0) 03:35:11 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000d73000)={0x2, 0x18, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}]}, 0x50}}, 0x0) [ 490.078543] cgroup: fork rejected by pids controller in /syz2 03:35:11 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x770a, 0x0) [ 490.202900] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 490.224956] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 03:35:11 executing program 0: io_setup(0x2, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000180)={0x0, @multicast2, 0x0, 0x0, 'ovf\x00'}, 0x2c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='-/keyringvboxnet0+trusted\x00'}, 0x10) getgroups(0x5e8, &(0x7f00000002c0)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$kcm(0x11, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000000c0)}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) socket$inet(0x10, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000340), &(0x7f0000000300)=0x4) syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x0, 0x0) 03:35:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x100000005, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000300), 0x0, &(0x7f0000001680)}, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) writev(r0, &(0x7f00000024c0)=[{&(0x7f00000000c0)="0f", 0x1}], 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000017c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001900)={'team0\x00'}) [ 490.252183] F2FS-fs (loop2): Invalid Fs Meta Ino: node(1) meta(2) root(223) [ 490.286858] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 490.321703] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 490.328876] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 03:35:11 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x770a, 0x0) 03:35:11 executing program 4: userfaultfd(0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) openat$md(0xffffffffffffff9c, &(0x7f0000002cc0)='/dev/md0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, &(0x7f0000002b40)={0x77359400}) openat$zero(0xffffffffffffff9c, &(0x7f0000002c40)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000002c80)) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, &(0x7f0000002b80)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, "9b3bf79c661a3bc4b984e2ccdc7c46ab57640547cabc79c5f0c516645321d21b554c7cc89d3664957f051cffd112cc6a55a07b32802a539eba4ee18bf1803515e91bef201dae4bf3de5c95a1caf8fc4a3d3bf1ca79877f2d6548ad15c774d4e9f4e7a7f96a7002cfd97878bd47a01b6d1cd91748cba2e5cdd36cd4fae259134d"}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003d00), 0x0, 0x0, &(0x7f0000003dc0)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0), &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @random="5bf5ee84fbcf"}, 0x3cf40aefbda97e44) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000380)=@generic) openat$userio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/userio\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000300)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@local, @remote}, &(0x7f00000000c0)=0xc) connect$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="a800ee338b76"}, 0x14) [ 490.376497] F2FS-fs (loop2): Invalid Fs Meta Ino: node(1) meta(2) root(223) [ 490.399269] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 03:35:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 490.478534] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 490.516330] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 490.554210] F2FS-fs (loop2): Invalid Fs Meta Ino: node(1) meta(2) root(223) [ 490.574100] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 490.587983] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 490.595372] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 490.605047] F2FS-fs (loop2): Invalid Fs Meta Ino: node(1) meta(2) root(223) [ 490.613838] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 03:35:12 executing program 2: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000880), 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000980)={0x0, @broadcast, @broadcast}, &(0x7f00000009c0)=0xc) recvfrom$packet(0xffffffffffffffff, &(0x7f00000008c0)=""/39, 0x27, 0x0, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="fd78e3206cf5"}, 0x14) mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e40)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:12 executing program 1: getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000700)=0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) creat(&(0x7f0000000240)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000003c0), 0x14) getpeername$llc(0xffffffffffffffff, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000780)=0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000380)={'rose0\x00', {0x2, 0x0, @multicast2}}) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x0, @multicast1}}, 0x0, 0x0, 0x0, "97b0cedaba370ab757823241831dd49dd28f264941d4a420d61164df69449682dc78c80b9ac09e51aa23a68c748a2610d70fc3b7958bff30ea67b05f5dfd7078cc8542c66f2ae959575c06ade6cbd5ca"}, 0xd8) semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000880)=""/213) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000007c0), &(0x7f0000000800)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000840), 0x8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) 03:35:12 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000002640)=@ipv6_newroute={0x1c, 0x18, 0x9, 0x0, 0x0, {0x11d, 0x1d01}}, 0x1c}}, 0x0) 03:35:12 executing program 3: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) eventfd(0x0) socket$nl_generic(0x10, 0x3, 0x10) creat(&(0x7f0000000440)='./file0\x00', 0x0) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000480)) sigaltstack(&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175e55d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 491.150189] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 03:35:12 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @broadcast}, &(0x7f0000000200)=0x10) close(0xffffffffffffffff) syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000440)={0x0, @local, @local}, &(0x7f0000000480)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@multicast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000740)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001280)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001340), &(0x7f0000001380)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001800)=@can, &(0x7f0000001780)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@mcast2, @in6}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000001980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000019c0)={{{@in6=@local, @in6=@ipv4}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000001ac0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001f80)={&(0x7f0000000280), 0xc, &(0x7f0000001f40)={&(0x7f0000001fc0)=ANY=[]}}, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') accept(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000240)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@remote, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@rand_addr, @dev}, &(0x7f0000000ac0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000d00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6=@remote, @in6=@remote}}, {{@in=@multicast2}}}, &(0x7f0000000f00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000f80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001000)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001040)={@local, @multicast2}, &(0x7f0000001080)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000012c0)={'vcan0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001400)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast2, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000001540)=0xe8) getsockname(0xffffffffffffffff, &(0x7f0000001580)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@dev, @in=@loopback}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000017c0)={'team0\x00'}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) syz_execute_func(&(0x7f00000005c0)="8055a0550fef69dce9d92a5c410f0e1837370f38211ac4c4820cfd9e20200feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac7f5d9f7f") 03:35:12 executing program 0: clock_gettime(0xfd010000, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004680), &(0x7f00000046c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:13 executing program 4: timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000980)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'veth1_to_bridge\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001000)={0x0, @multicast2, @broadcast}, &(0x7f0000001040)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000010c0)={0x0, @loopback, @rand_addr}, &(0x7f0000001100)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001180)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000011c0)={{{@in6=@local, @in=@local}}, {{@in6=@local}}}, &(0x7f00000012c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001380)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001580)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003d80)={@empty, @dev}, &(0x7f0000003dc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003ec0)={{}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000003fc0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004000)={@ipv4={[], [], @loopback}}, &(0x7f0000004040)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000050c0)={@local}, &(0x7f0000005100)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000005140)={@mcast2}, &(0x7f0000005180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000051c0), &(0x7f0000005200)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000005540)={@empty, @multicast1}, &(0x7f0000005580)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000055c0)={0x0, @empty, @multicast1}, &(0x7f0000005600)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000005640)={@rand_addr, @multicast2}, &(0x7f0000005680)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000005780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000057c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005800)={@remote, @local}, &(0x7f0000005840)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000005880)={@dev, @remote}, &(0x7f00000058c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000005900)={'nr0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005ac0)={{{@in=@rand_addr, @in=@loopback}}, {{@in6}, 0x0, @in6}}, &(0x7f0000005bc0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005f80)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000005fc0)={'team0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006a80)={&(0x7f0000000940), 0xc, &(0x7f0000006a40)={&(0x7f0000006000)={0x14}, 0x14}}, 0x0) getuid() fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f00000006c0)=0xe8) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240), 0xc, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[]}}, 0x0) pipe(&(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:13 executing program 2: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000004c0)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000540)={0x2, 0x0, @dev}, &(0x7f0000000580)=0x10, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000005c0)={'bridge0\x00'}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000500)='cpuset\x00') epoll_create1(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:35:13 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) 03:35:13 executing program 3: keyctl$set_reqkey_keyring(0x2, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003480)={{{@in6=@loopback, @in=@remote}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000003580)=0xe8) getgid() syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:13 executing program 5: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000500), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") 03:35:13 executing program 3: socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @loopback}}}, 0x88) clock_getres(0x0, &(0x7f00000003c0)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x3000)=nil, 0x0) shmdt(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000006c0)={'TPROXY\x00'}, &(0x7f0000000700)=0x1e) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x12, 0x5, 0xfa00, {&(0x7f00000008c0)}}, 0x18) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000940)={'nat\x00'}, &(0x7f0000000300)=0x60) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") 03:35:13 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x400, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="e829632076b73915dfe8e491c440930436607df60937b03eacc8092c3de219937023eef94fd58a07173ed7976d85ee00bf1afc8263046d827518dc99af5730eb9e6ffac4a24556aeb32e7e636121be4b4686e5c6ee4a06840b4387ddb9d1b5f888cca4ee35f7621dc2385cfb99433b76b4439db04279e62126a0442758ba232c93b0dd75ce2a1a26869bcc6df9cd72b49c6233c7861057ce72c022e93e31a814128f08a2c8c9", 0xa6) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)) r1 = getpid() getpgid(r1) 03:35:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x100000003, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) recvmmsg(r0, &(0x7f0000001cc0), 0x4000000000002c0, 0x10102, &(0x7f0000001540)={r1}) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40004000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x8c, r2, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x397c}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8000}, 0x4) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x5}) 03:35:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0)={[{@gid={'gid', 0x3d, r1}}]}) [ 492.586344] BTRFS: device fsid ecf6f2a3-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop4 [ 492.697710] hfs: gid requires an argument 03:35:14 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623692500080014001000080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000e2d4ec6bab91d4", 0x55}], 0x1, &(0x7f0000000200)}, 0x0) [ 492.732068] hfs: unable to parse mount options [ 492.823550] hfs: gid requires an argument [ 492.830337] hfs: unable to parse mount options [ 492.831197] BTRFS error (device loop4): superblock checksum mismatch 03:35:14 executing program 2: memfd_create(&(0x7f0000000300)="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", 0x0) removexattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@known='trusted.syz\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000080)=0x185) fstat(0xffffffffffffffff, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000dc0), 0x4) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000e00)) getgroups(0x0, &(0x7f0000000d00)) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000d80), 0x4) getgid() setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000e80), 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) write$vnet(0xffffffffffffffff, &(0x7f0000000280)={0x1, {&(0x7f0000000480)=""/140, 0x8c, &(0x7f0000000540)=""/178}}, 0x68) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast2, @in=@loopback}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000ec0)=0xe8) syz_open_procfs$namespace(0x0, &(0x7f0000000d40)='ns/pid_for_children\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000e40)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 492.891013] BTRFS error (device loop4): open_ctree failed 03:35:14 executing program 1: keyctl$set_reqkey_keyring(0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) fstat(0xffffffffffffffff, &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000980)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000940), 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x14}, 0x14}}, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x100000003, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) recvmmsg(r0, &(0x7f0000001cc0), 0x4000000000002c0, 0x10102, &(0x7f0000001540)={r1}) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40004000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x8c, r2, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x397c}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8000}, 0x4) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x5}) 03:35:14 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x400, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="e829632076b73915dfe8e491c440930436607df60937b03eacc8092c3de219937023eef94fd58a07173ed7976d85ee00bf1afc8263046d827518dc99af5730eb9e6ffac4a24556aeb32e7e636121be4b4686e5c6ee4a06840b4387ddb9d1b5f888cca4ee35f7621dc2385cfb99433b76b4439db04279e62126a0442758ba232c93b0dd75ce2a1a26869bcc6df9cd72b49c6233c7861057ce72c022e93e31a814128f08a2c8c9", 0xa6) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)) r1 = getpid() getpgid(r1) 03:35:14 executing program 5: signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/235) lremovexattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000003f40)=ANY=[]) accept$inet(0xffffffffffffffff, &(0x7f00000007c0)={0x2, 0x0, @broadcast}, &(0x7f0000003fc0)=0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000004040)={'icmp\x00'}, &(0x7f0000004080)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd2(0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000003d40)={&(0x7f00000023c0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b80)}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000640)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast1, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000780)=0xe8) getgid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001b80)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001c80)=0xe8) stat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000002000)) getegid() getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002080)={{{@in=@rand_addr, @in=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@loopback}}, &(0x7f0000002180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000021c0)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) getegid() getpgid(0x0) stat(&(0x7f0000002300)='./file1\x00', &(0x7f0000002340)) stat(&(0x7f0000002440)='./file0\x00', &(0x7f0000002480)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002500)={{{@in6=@ipv4={[], [], @loopback}, @in6=@loopback}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000002600)=0xe8) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002680), &(0x7f00000026c0)=0xc) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002700)) lstat(&(0x7f0000002740)='./file0\x00', &(0x7f0000002780)) getgroups(0x0, &(0x7f0000002800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002840), &(0x7f0000002880)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000028c0)={{{@in6, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f00000029c0)=0xe8) stat(&(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)) getpgrp(0x0) stat(&(0x7f0000003100)='./file0\x00', &(0x7f0000003140)) syz_execute_func(&(0x7f0000004000)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:35:14 executing program 3: clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timerfd_create(0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) rt_sigreturn() clock_gettime(0x0, &(0x7f0000000080)) utimensat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{}, {0x0, 0x7530}}, 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in, @in6=@dev}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000480)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@dev}, &(0x7f0000000800)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e80)={{{@in=@remote, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000e40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vcan0\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000240), 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)={0x14}, 0x14}}, 0x0) [ 493.403455] BTRFS error (device loop4): superblock checksum mismatch 03:35:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x100000003, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) recvmmsg(r0, &(0x7f0000001cc0), 0x4000000000002c0, 0x10102, &(0x7f0000001540)={r1}) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40004000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x8c, r2, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x397c}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8000}, 0x4) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x5}) [ 493.454532] BTRFS error (device loop4): open_ctree failed 03:35:15 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x400, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="e829632076b73915dfe8e491c440930436607df60937b03eacc8092c3de219937023eef94fd58a07173ed7976d85ee00bf1afc8263046d827518dc99af5730eb9e6ffac4a24556aeb32e7e636121be4b4686e5c6ee4a06840b4387ddb9d1b5f888cca4ee35f7621dc2385cfb99433b76b4439db04279e62126a0442758ba232c93b0dd75ce2a1a26869bcc6df9cd72b49c6233c7861057ce72c022e93e31a814128f08a2c8c9", 0xa6) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)) r1 = getpid() getpgid(r1) 03:35:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x100000003, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) recvmmsg(r0, &(0x7f0000001cc0), 0x4000000000002c0, 0x10102, &(0x7f0000001540)={r1}) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40004000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x8c, r2, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x397c}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8000}, 0x4) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x5}) 03:35:15 executing program 1: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) mknod(&(0x7f00007f2ff8)='./file0\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000380)) sendmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) open(&(0x7f00007ddff8)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") 03:35:15 executing program 2: keyctl$set_reqkey_keyring(0x2, 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000740)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8) geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6}}, 0xe8) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f00000001c0)={0x77359400}, 0x10) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@link_local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "45eb63", 0x8, 0x0, 0x0, @mcast1, @ipv4={[], [], @local}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f00000000c0)) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000240)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) rt_sigsuspend(&(0x7f0000000340), 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000004c0)) clone(0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") [ 493.953293] BTRFS error (device loop4): superblock checksum mismatch [ 494.051638] BTRFS error (device loop4): open_ctree failed 03:35:15 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x400, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="e829632076b73915dfe8e491c440930436607df60937b03eacc8092c3de219937023eef94fd58a07173ed7976d85ee00bf1afc8263046d827518dc99af5730eb9e6ffac4a24556aeb32e7e636121be4b4686e5c6ee4a06840b4387ddb9d1b5f888cca4ee35f7621dc2385cfb99433b76b4439db04279e62126a0442758ba232c93b0dd75ce2a1a26869bcc6df9cd72b49c6233c7861057ce72c022e93e31a814128f08a2c8c9", 0xa6) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)) r1 = getpid() getpgid(r1) 03:35:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x2001d070}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="46805da06ebd260f70741181a5c4230cf961d055ce73fe19fa380f78b5c4417f1201f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e6f3420faedd0703") 03:35:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000200), 0xffffff57, &(0x7f00000001c0)={&(0x7f00000002c0)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x123, 0x0, 0x0, {{{@in6=@ipv4={[], [], @local}}, {@in6=@ipv4={[], [], @broadcast}, 0x0, 0x6c}, @in6}}}, 0xf8}, 0x8}, 0x0) [ 494.500133] BTRFS error (device loop4): superblock checksum mismatch [ 494.512507] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 494.530367] BTRFS error (device loop4): open_ctree failed [ 494.567818] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 03:35:16 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/null\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001d00), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000002240)=0xe8) getresgid(&(0x7f0000002280), &(0x7f00000022c0), &(0x7f0000002300)) geteuid() getgroups(0x0, &(0x7f0000002340)) fstat(0xffffffffffffffff, &(0x7f0000002380)) getresgid(&(0x7f0000002400), &(0x7f00000024c0), &(0x7f00000025c0)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002740)={&(0x7f0000001fc0)=@abs, 0x6e, &(0x7f0000001d40), 0x0, &(0x7f0000002780)=ANY=[]}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000740)="2176626f786e65ffffffff6c696eff0742066006554d2b0069a09cf15b5526cf3d89b7dc4cab71df2691a0aa90976eb0ee294987e0fff98ae9c7534dc890569d52e5695428ea8adb0718f46f7c981f07c2c551ccc718c75022ba7e2044c660672d044a3db2879852461138b5944ac78e2a6391a5cb0e806be0cd0ebe0908ac26281fe95a86b4", 0xffffffffffffff9c}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000280)=0xe8) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[], 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) tgkill(0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@loopback, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000600)=0xe8) gettid() utime(&(0x7f0000002500)='./file0\x00', &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000002c0)=0xc) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000300)={{0x0, @remote, 0x0, 0x0, 'wlc\x00'}, {@broadcast}}, 0x44) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:16 executing program 5: mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00') keyctl$session_to_parent(0x12) fstat(0xffffffffffffff9c, &(0x7f0000000380)) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xb, 0x82000, 0x100000001, 0x1, 0xffffffffffffffff, 0x0, [0x5f]}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000001c0), &(0x7f00000000c0)}, 0x20) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000100), &(0x7f00000000c0)}, 0x20) 03:35:16 executing program 4: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) write$sndseq(0xffffffffffffffff, &(0x7f0000000480), 0x0) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000380)={'dummy0\x00'}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000280)) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000600)) 03:35:16 executing program 1: socketpair$unix(0x1, 0x2000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000000c0)) ioctl$TCSBRK(r1, 0x5409, 0x0) 03:35:16 executing program 1: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=@random={'trusted.', '\\[,em0}[keyringwlan1em0\x00'}, &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) gettid() pkey_alloc(0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000180)={0x0, 'rose0\x00'}, 0x18) fstat(0xffffffffffffffff, &(0x7f0000000880)) getgroups(0x0, &(0x7f0000000940)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) stat(&(0x7f0000000a40)='./file0/file0\x00', &(0x7f0000000a80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in, @in=@dev}}, {{@in=@loopback}}}, &(0x7f0000000c00)=0xe8) getegid() lstat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getuid() getgid() getuid() lstat(&(0x7f0000006800)='./file1\x00', &(0x7f0000006840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000068c0), &(0x7f0000006900)=0xc) stat(&(0x7f0000006940)='./file0\x00', &(0x7f0000006980)) stat(&(0x7f0000006b80)='./file0\x00', &(0x7f0000006bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000007280)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000072c0), &(0x7f0000007300)=0xc) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007340), &(0x7f0000007380)=0xc) getegid() getresuid(&(0x7f00000073c0), &(0x7f0000007400), &(0x7f0000007440)) getresgid(&(0x7f0000007480), &(0x7f00000074c0), &(0x7f0000007500)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007540)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007580)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000007680)=0xe8) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000076c0)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f00000077c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007800), &(0x7f0000007840)=0xc) getresuid(&(0x7f0000007c40), &(0x7f0000007c80), &(0x7f0000007cc0)) getgroups(0x0, &(0x7f0000007d00)) stat(&(0x7f0000007d40)='./file0\x00', &(0x7f0000007d80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007e00), &(0x7f0000007e40)=0xc) lstat(&(0x7f00000081c0)='./file0\x00', &(0x7f0000008200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008280)={{{@in6, @in=@remote}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000008380)=0xe8) getgid() getuid() fstat(0xffffffffffffffff, &(0x7f000000a0c0)) getgroups(0x0, &(0x7f0000008500)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008540)={{{@in6=@remote, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000008640)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008680), &(0x7f00000086c0)=0xc) lstat(&(0x7f0000008700)='./file0\x00', &(0x7f0000008740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000087c0), &(0x7f0000008800)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008840)={{{@in, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000008940)=0xe8) lstat(&(0x7f0000008980)='./file0\x00', &(0x7f00000089c0)) lstat(&(0x7f0000009180)='./file0\x00', &(0x7f00000091c0)) getresgid(&(0x7f0000009240), &(0x7f0000009280), &(0x7f00000092c0)) stat(&(0x7f0000009300)='./file0\x00', &(0x7f0000009340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000093c0), &(0x7f0000009400)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009780)={{{@in=@dev, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000009880)=0xe8) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) setsockopt$inet_mtu(r1, 0x0, 0x8, &(0x7f0000000180), 0x4) close(r1) 03:35:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000340)}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000000)=0xe2b, 0x4) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@can, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000480)=""/40, 0x28}, 0x0) 03:35:16 executing program 0: futex(&(0x7f0000000440), 0x8, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000680)=ANY=[]) syz_extract_tcp_res(&(0x7f00000003c0), 0x0, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000380)) getuid() getgroups(0x0, &(0x7f0000000700)) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000740)={0x90}, 0x90) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) add_key(&(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000140), &(0x7f0000000180), 0x0, 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000200)='.request_key_auth\x00', &(0x7f0000000540), 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000300)) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000580)=ANY=[], 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000680)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) socket$vsock_stream(0x28, 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000700)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'dummy0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000180), 0xc, &(0x7f0000000a80)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffd) rt_sigpending(&(0x7f0000000400), 0x8) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000480), 0x4) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000001c0), 0x4) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:17 executing program 3: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000340)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@norecovery='norecovery'}]}) 03:35:17 executing program 5: clock_getres(0x0, &(0x7f0000000400)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_emit_ethernet(0x0, &(0x7f0000001a80)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000002d00)={&(0x7f0000000180)}) geteuid() ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000180)=""/244) getegid() perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f0000000700)=""/4096, 0x1000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000002c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getegid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000640), 0x0, &(0x7f0000001900)}, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f000000b000), &(0x7f000000dfe0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500), &(0x7f00000006c0), 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000540)='rxrpc_s\x00', &(0x7f0000000580), &(0x7f00000007c0), 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, 0x0) [ 495.818878] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 495.839030] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 03:35:17 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$P9_RWRITE(r0, &(0x7f0000000040)={0xb}, 0xb) [ 495.884057] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 495.911489] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 496.012062] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 496.019129] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 03:35:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) utime(&(0x7f0000000340)='./file0\x00', &(0x7f00000004c0)) 03:35:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) setsockopt$inet_mtu(r1, 0x0, 0x8, &(0x7f0000000180), 0x4) close(r1) [ 496.071857] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 496.087488] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 03:35:17 executing program 3: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280), &(0x7f0000000780)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000500)={0x0, @in={{0x2, 0x0, @dev}}}, 0x90) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000840)=""/66, &(0x7f00000008c0)=0x42) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sched_getattr(0x0, &(0x7f00000007c0), 0x30, 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000a40)) clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x2f) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) 03:35:17 executing program 4: socket$inet(0x2, 0xa, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000740)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00'}, 0x118) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000600), 0x4) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000580)) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000b00)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000140)) socket$inet_smc(0x2b, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ftruncate(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:35:17 executing program 0: sigaltstack(&(0x7f0000c75000/0x4000)=nil, &(0x7f00000000c0)) socket$nl_netfilter(0x10, 0x3, 0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000002a40)=0xc) syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002740)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000002840)=0xe8) lstat(&(0x7f0000002880)='./file0\x00', &(0x7f00000028c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000002940)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002980), &(0x7f0000000040)=0xfffffeca) lstat(&(0x7f0000002a00)='./file0\x00', &(0x7f0000005140)) fstat(0xffffffffffffffff, &(0x7f0000002ac0)) getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002b40)={{{@in=@multicast2, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000002c40)=0xe8) getresgid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002d40)={{{@in6, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000002e40)=0xe8) getgroups(0x0, &(0x7f0000002e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002ec0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a07d6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a42dbe0c19086d9f28fc9410feefae5e54175a55d0f2e1a1a010d64ac1e5d31a3b786e298977f") 03:35:19 executing program 5: fanotify_init(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) setsockopt$inet_mtu(r1, 0x0, 0x8, &(0x7f0000000180), 0x4) close(r1) 03:35:19 executing program 1: clock_gettime(0x8, &(0x7f0000000500)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:35:19 executing program 3: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000001540)='IPVS\x00', 0xffffffffffffff9c}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) clock_gettime(0x0, &(0x7f0000001580)) pipe(&(0x7f0000000180)) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001680)={{{@in=@remote, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000001780)=0xe8) stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) getgroups(0x354, &(0x7f0000001880)) fstat(0xffffffffffffffff, &(0x7f00000018c0)) fstat(0xffffffffffffffff, &(0x7f0000001940)) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:19 executing program 0: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_RMID(0x0, 0x0) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000008c0)=0xe8) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) getresgid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)) getgroups(0x0, &(0x7f0000000b00)) fstat(0xffffffffffffffff, &(0x7f0000000b40)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[], 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) dup(0xffffffffffffffff) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000c00)) getpid() geteuid() setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000bc0), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:19 executing program 4: pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) setsockopt$inet_mtu(r1, 0x0, 0x8, &(0x7f0000000180), 0x4) close(r1) 03:33:20 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000000)=[{0x18, 0x0, 0x7, "8908c91499"}], 0x18}}], 0x2, 0x0) 03:33:20 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="0243443030310100004c0049004e00550058002000200020002000200020007bb220002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bb000000000000bb252f43bbf5080eb5ac37d861796fb9453a0863abfc28fcadc935fa785d031b47049aa437471f7ec978ec", 0x82, 0x9000}], 0x0, &(0x7f00000002c0)) 03:33:20 executing program 0: prctl$intptr(0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') getsockname$inet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000500)=0x10) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) gettid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000540), 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000580), &(0x7f00000005c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000600), &(0x7f0000000640)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:20 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x90}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:33:20 executing program 1: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) inotify_init1(0x0) prctl$void(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], &(0x7f0000000640)=""/107, 0x6b) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100), &(0x7f0000000140)='nodev\x00', 0xfffffffffffffffd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:20 executing program 2: futimesat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) openat$dsp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dsp\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$pppoe(0x18, 0x1, 0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @reserved}, 0x10, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000d40)=""/253) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000480)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000500)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f0000000640)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:33:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x500, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000040)={0x1, {0x77359400}, 0x6}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000180)="0f00db670f01df66b8000000000f23d80f21f86635400000f00f23f80f09b800008ee00f009a00000f212b0f01c30f21b00f1af9", 0x34}], 0x1, 0x0, &(0x7f0000000080), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000080)="0f0626360f0136996d66b8010000000f23d80f21f86635000000a00f23f80f01ca66b9800000c00f326635000400000f30656726f2af65f4650f01caf40f6a2e0000", 0x42}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000540)={0xd0003, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) perf_event_open(&(0x7f00000002c0)={0x1, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 498.701516] ISOFS: Bad logical zone size 60536 03:33:20 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x90}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) [ 498.792325] ISOFS: Bad logical zone size 60536 03:33:20 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0xa, &(0x7f0000000240)={0x7}, 0xc) 03:33:20 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="0243443030310100004c0049004e00550058002000200020002000200020007bb220002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bb000000000000bb252f43bbf5080eb5ac37d861796fb9453a0863abfc28fcadc935fa785d031b47049aa437471f7ec978ec", 0x82, 0x9000}], 0x0, &(0x7f00000002c0)) 03:33:20 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x90}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:33:20 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x90}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) [ 499.026668] ISOFS: Bad logical zone size 60536 03:33:20 executing program 0: clock_getres(0x2, &(0x7f0000000c80)) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)="2f7079732f6e65742f697076342f76732f6578706972655f717569657363656e745f74656d706c618765000000000000", 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f00000003c0)='projid_map\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000940)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000400)=0xffffffffffffff55) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000200)) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/157, &(0x7f00000000c0)=0x9d) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[], 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) unlinkat(0xffffffffffffffff, &(0x7f0000000b00)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000a40)) setitimer(0x0, &(0x7f0000000a80), &(0x7f0000000ac0)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 03:33:20 executing program 3: getitimer(0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000006c0)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x0, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000340), {[{{@arp={@remote, @rand_addr, 0x0, 0x0, @empty, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @remote, @remote}}}, {{@arp={@empty, @loopback, 0x0, 0x0, @mac=@local, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'yam0\x00', 'bond_slave_0\x00'}, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00'}}, {{@arp={@rand_addr, @rand_addr, 0x0, 0x0, @empty, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'ipddp0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) clock_gettime(0x0, &(0x7f00000000c0)) write$evdev(0xffffffffffffffff, &(0x7f0000000280), 0x0) syz_execute_func(&(0x7f0000000240)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f2ead") add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffff8) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.mem_hardwall\x00', 0x2, 0x0) request_key(&(0x7f00000005c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000680)='trusted.overlay.opaque\x00', 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000280)="218317ebf927593700") getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=""/15, &(0x7f0000000180)=0xf) 03:33:20 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="0243443030310100004c0049004e00550058002000200020002000200020007bb220002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bb000000000000bb252f43bbf5080eb5ac37d861796fb9453a0863abfc28fcadc935fa785d031b47049aa437471f7ec978ec", 0x82, 0x9000}], 0x0, &(0x7f00000002c0)) 03:33:20 executing program 4: io_cancel(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f0000000100)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sed\x00', 0xffffffffffffff9c}, 0x10) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") rmdir(&(0x7f0000000340)='./file0\x00') [ 499.260541] ISOFS: Bad logical zone size 60536 03:33:21 executing program 1: getpgrp(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='rxrpc\x00', &(0x7f0000000540), 0x0, 0x0, 0xfffffffffffffff9) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000200), &(0x7f0000000240)=0x8) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000280)={0x0, @in6}, &(0x7f0000000340)=0x98) pipe2(&(0x7f0000000380), 0x0) 03:33:21 executing program 2: mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) eventfd2(0x0, 0x0) eventfd2(0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000c80)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000d40)={{{@in6=@remote, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000011c0)={{{@in=@remote}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000012c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001300)={{{@in6, @in6=@local}}, {{@in=@local}}}, &(0x7f0000001400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001440), &(0x7f0000001480)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001580)={@remote, @multicast2}, &(0x7f00000015c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001600)={{{@in6=@mcast2, @in=@local}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000001700)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000017c0)={@loopback, @broadcast}, &(0x7f0000001800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001880)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f00000018c0), &(0x7f0000001900)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001940)={'bcsf0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001980)={@multicast1}, &(0x7f00000019c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001a00)={'ip6_vti0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001a40)={@dev}, &(0x7f0000001a80)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001b40)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001bc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001d00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001e40)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001f40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f80)={{{@in6, @in=@remote}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002080)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b40)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002c40)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") eventfd2(0x0, 0x0) 03:33:21 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000540)) socket$packet(0x11, 0x0, 0x300) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f00000003c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:21 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="0243443030310100004c0049004e00550058002000200020002000200020007bb220002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bb000000000000bb252f43bbf5080eb5ac37d861796fb9453a0863abfc28fcadc935fa785d031b47049aa437471f7ec978ec", 0x82, 0x9000}], 0x0, &(0x7f00000002c0)) [ 499.661795] ISOFS: Bad logical zone size 60536 03:33:21 executing program 5: keyctl$set_reqkey_keyring(0x7, 0x0) utime(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000a00)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept(0xffffffffffffff9c, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') syz_execute_func(&(0x7f0000000180)="c4a3791678f5e7f2450f59d6f243a4c483755d59110047c0baffefffff176636660f2f65420fd7e5d3d2c4013dfa5700c402e99aa901590000") 03:33:21 executing program 5: add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='cgroup\x00') getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f00000003c0), &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480), &(0x7f0000000580)=0x14) keyctl$clear(0x7, 0x0) prctl$setname(0x59616d61, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) dup(0xffffffffffffffff) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000006380), &(0x7f00000063c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006440)={0x0, @dev, @multicast2}, &(0x7f0000006480)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006600)={{{@in6=@mcast1, @in=@dev}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='proc-*\x00', 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000640)=ANY=[], 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000400)) creat(&(0x7f0000000600)='./file0\x00', 0x0) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:33:21 executing program 4: mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000940)) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004400)={&(0x7f0000000900)=@proc, 0xc, &(0x7f0000000840), 0x0, &(0x7f0000004300)}, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'sq\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000640)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428045a0a16969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01370f01ee31a3b786e2989f") 03:33:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000340)}, 0x20) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000140)={'bridge0\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000065c0)={&(0x7f0000000040), 0xc, &(0x7f0000006580)={&(0x7f0000005f80)={0x20, r1, 0x11, 0x0, 0x0, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 03:33:22 executing program 2: msgget(0xffffffffffffffff, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) fstat(0xffffffffffffff9c, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getresgid(&(0x7f00000002c0), &(0x7f00000003c0), &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) getpgid(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000004300)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000240), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0xfffffffffffffce7) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000980)={{{@in=@multicast1, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)={@remote}, &(0x7f0000002040)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'yam0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002280)={@local, @remote}, &(0x7f00000022c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f00000024c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002540)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002580)={0x0, @multicast2, @multicast1}, &(0x7f00000025c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000026c0)={{{@in, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002800)={@dev}, &(0x7f0000002840)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002980)={@mcast1}, &(0x7f00000029c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002a40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002a80)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000002b80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002c80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002cc0)={{{@in6=@ipv4={[], [], @loopback}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000002dc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002e00)={@remote, @local}, &(0x7f0000002e40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002e80)={{{@in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000002f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002fc0)={{{@in=@remote, @in=@rand_addr}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f00000030c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003100)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003140)={0x0, @remote, @remote}, &(0x7f0000003180)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003880)={&(0x7f0000000140), 0xc, &(0x7f0000003840)={&(0x7f0000000ac0)=ANY=[]}}, 0x0) request_key(&(0x7f00000004c0)='rxrpc_s\x00', &(0x7f0000000500), &(0x7f0000000540)="7465716c30000000763c24682727162d", 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 03:33:22 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) close(r1) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xe903, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 03:33:22 executing program 3: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0x10) 03:33:22 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x200005, 0x4) sendto$inet6(r0, &(0x7f00000002c0)="0501000005006e000000a844eb1ff5ec2c71820fd903378c58160aaacb57a80000061a80e19e33e3c2e7725f4a58611537a0be625ef7402810fadc5712f29508c008e265756fe5eb8f590e78ecff1128d9e9aba5568a12845f84310a0aca7a0f2a38d18de194fbc420ec1cec6a5c8f71b722759db4c3ff304df4", 0x7a, 0x0, &(0x7f00000000c0)={0xa, 0x100200000800, 0x4, @loopback}, 0x1c) 03:33:22 executing program 3: clone(0x202102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) unshare(0x40000000) socketpair$inet6(0xa, 0x802, 0x9, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @remote}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000280)={r1}, &(0x7f00000002c0)=0x8) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000540)) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7, 0x40) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000580), &(0x7f00000005c0)=0x4) sendmsg$nl_crypto(r2, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=@del={0xf0, 0x11, 0x800, 0x0, 0x0, {{'morus640-generic\x00'}, [], [], 0x2000}, [{0x8}, {0x8}]}, 0xf0}}, 0x0) socket$pppoe(0x18, 0x1, 0x0) sync() r3 = socket(0x0, 0x0, 0x0) getsockopt$sock_buf(r3, 0x1, 0x0, &(0x7f0000000300)=""/180, &(0x7f0000000000)=0xb4) exit(0x0) 03:33:22 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)=ANY=[]) symlink(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0/file0\x00') unlink(&(0x7f0000000240)='./file0/file0\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='lomd5sumeth0*@:%bdev\x00'}, 0xfffffffffffffff3) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'sit0\x00', @ifru_names='ifb0\x00'}) [ 501.121151] IPVS: ftp: loaded support on port[0] = 21 03:33:22 executing program 5: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000600)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000940)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000980)=""/210, 0xd2, 0x0, &(0x7f0000000a80)=@file={0x0, './file0\x00'}, 0x6e) getresuid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000880)) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000008c0)) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/net\x00') memfd_create(&(0x7f00000002c0)=')\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300), 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) 03:33:22 executing program 4: clock_getres(0xffffffffffffffff, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000740)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz1'}, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") [ 501.336498] IPVS: ftp: loaded support on port[0] = 21 03:33:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x3, 0x0, 0x0, 0x0, 0xfffffffffffff11c}}) 03:33:22 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fcntl$notify(r1, 0x402, 0x400000000000031) exit(0x0) fchown(r1, 0x0, 0x0) 03:33:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000004300)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000240), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0xfffffffffffffce7) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000980)={{{@in=@multicast1, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)={@remote}, &(0x7f0000002040)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'yam0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002280)={@local, @remote}, &(0x7f00000022c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f00000024c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002540)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002580)={0x0, @multicast2, @multicast1}, &(0x7f00000025c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000026c0)={{{@in, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002800)={@dev}, &(0x7f0000002840)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002980)={@mcast1}, &(0x7f00000029c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002a40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002a80)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000002b80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002c80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002cc0)={{{@in6=@ipv4={[], [], @loopback}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000002dc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002e00)={@remote, @local}, &(0x7f0000002e40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002e80)={{{@in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000002f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002fc0)={{{@in=@remote, @in=@rand_addr}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f00000030c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003100)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003140)={0x0, @remote, @remote}, &(0x7f0000003180)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003880)={&(0x7f0000000140), 0xc, &(0x7f0000003840)={&(0x7f0000000ac0)=ANY=[]}}, 0x0) request_key(&(0x7f00000004c0)='rxrpc_s\x00', &(0x7f0000000500), &(0x7f0000000540)="7465716c30000000763c24682727162d", 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 03:33:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) memfd_create(&(0x7f0000000040)='/dev/full\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) flock(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) 03:33:23 executing program 3: signalfd4(0xffffffffffffffff, &(0x7f0000000540), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000006c0)='cifs.spnego\x00', &(0x7f0000000340), &(0x7f0000000740)='/dev/zero\x00', 0x0) keyctl$dh_compute(0x17, &(0x7f0000000780), &(0x7f00000007c0)=""/195, 0xc3, &(0x7f0000000940)={&(0x7f00000008c0)={'sha256-avx\x00'}, &(0x7f0000000900)}) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d00), &(0x7f0000000180)=0xc) fstat(0xffffffffffffffff, &(0x7f00000004c0)) getpgid(0xffffffffffffffff) getresgid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) getpgid(0x0) getuid() lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000032c0)) getresuid(&(0x7f0000003300), &(0x7f0000003340), &(0x7f0000003380)) fstat(0xffffffffffffffff, &(0x7f00000033c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003440), &(0x7f0000003480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000034c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000035c0)=0xe8) getgroups(0x0, &(0x7f0000003600)) gettid() getgroups(0x400000000000019c, &(0x7f0000000580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003a40)={{{@in6}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003b40)=0xe8) getgroups(0x0, &(0x7f0000003b80)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003cc0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003dc0)=0xe8) stat(&(0x7f0000003e00)='./file0\x00', &(0x7f0000003e40)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000044c0)={{{@in6=@remote, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f00000045c0)=0xe8) getgid() getpgid(0xffffffffffffffff) 03:33:23 executing program 5: clock_getres(0x0, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f0000000300), &(0x7f0000000400)}}, &(0x7f0000000180)) semget(0xffffffffffffffff, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000600), &(0x7f0000000640), 0x8) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000780)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000500)=""/63) timer_delete(0x0) syz_open_dev$mouse(&(0x7f0000000680)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000006c0)={{}, 'port0\x00'}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000040), 0x4) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0xc) creat(&(0x7f0000000300)='./file0\x00', 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f00000005c0)=0xe8) bind$xdp(0xffffffffffffffff, &(0x7f0000000400), 0x10) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x8) semget(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0876969ef69dc00d9f0008f00008020c4a3750647099e1837370f38211ac4c19086d9f28fc9410feefac461b1e121e5e54175450f2e1ac4010d6453ac5d31a3b7f0802403088e9fa3a74b") 03:33:23 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x40, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000280)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000340)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000500)=0xe8) getuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000d40)) syz_open_dev$adsp(&(0x7f0000001240)='/dev/adsp#\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001340)) getuid() socket$l2tp(0x18, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pipe(&(0x7f0000001740)) syz_open_dev$vcsn(&(0x7f0000001780)='/dev/vcs#\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000017c0)={0x28, 0x0, 0x0, @hyper}, 0x10, 0x0) socket$pppoe(0x18, 0x1, 0x0) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000001800), 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$binder(&(0x7f0000001840)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$pptp(0x18, 0x1, 0x2) openat$userio(0xffffffffffffff9c, &(0x7f0000001880)='/dev/userio\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000018c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001980)='memory.swap.current\x00', 0x0, 0x0) eventfd2(0x0, 0x0) syz_open_dev$vcsn(&(0x7f00000019c0)='/dev/vcs#\x00', 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/ion\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001a40)='cpu.stat\x00', 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/userio\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/urandom\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) getpgid(0x0) fstat(0xffffffffffffff9c, &(0x7f0000001b00)) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001c40)) getuid() getegid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001d80)={&(0x7f0000000180), 0xc, &(0x7f00000016c0), 0x0, &(0x7f0000001c80)}, 0x0) futex(&(0x7f0000000140), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000080)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:23 executing program 1: pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000004300)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000240), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0xfffffffffffffce7) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000980)={{{@in=@multicast1, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)={@remote}, &(0x7f0000002040)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'yam0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002280)={@local, @remote}, &(0x7f00000022c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f00000024c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002540)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002580)={0x0, @multicast2, @multicast1}, &(0x7f00000025c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000026c0)={{{@in, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002800)={@dev}, &(0x7f0000002840)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002980)={@mcast1}, &(0x7f00000029c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002a40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002a80)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000002b80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002c80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002cc0)={{{@in6=@ipv4={[], [], @loopback}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000002dc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002e00)={@remote, @local}, &(0x7f0000002e40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002e80)={{{@in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000002f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002fc0)={{{@in=@remote, @in=@rand_addr}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f00000030c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003100)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003140)={0x0, @remote, @remote}, &(0x7f0000003180)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003880)={&(0x7f0000000140), 0xc, &(0x7f0000003840)={&(0x7f0000000ac0)=ANY=[]}}, 0x0) request_key(&(0x7f00000004c0)='rxrpc_s\x00', &(0x7f0000000500), &(0x7f0000000540)="7465716c30000000763c24682727162d", 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 03:33:24 executing program 2: munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:24 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_SET_CAPACITY(r0, 0x401870cc) 03:33:24 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x315440, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c8400f1837370f38211ac4c19086d9f28fd9410feefa4e2179fbe5e54175455d0f2e1a911a01660ff7f031a3b786e2989f7f") 03:33:24 executing program 5: semget(0xffffffffffffffff, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@remote, @in=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8) 03:33:24 executing program 4: sigaltstack(&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000000)) mlockall(0x5) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) 03:33:24 executing program 1: recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f00000000c0)}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380)=""/205, &(0x7f0000000480)=0xcd) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f00000004c0)) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000002c0)={'veth0_to_bond\x00'}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@local, @broadcast}, &(0x7f0000000940)=0xc) sendmmsg(0xffffffffffffffff, &(0x7f0000002540), 0x0, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000740)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eee660f29600339f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989fe577") lookup_dcookie(0x0, &(0x7f0000000a40)=""/173, 0xabb7d29882866c4f) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000002c0)) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f0000000480)) memfd_create(&(0x7f00000004c0)='/dev/ppp\x00', 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dsp\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) gettid() lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f40), &(0x7f0000000f80)=0xc) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001180)={{{@in6, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000001280)=0xe8) stat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001380)) getuid() getegid() fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)) lstat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000017c0)) fstat(0xffffffffffffffff, &(0x7f0000001800)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000018c0)={{{@in=@dev, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000019c0)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a00), &(0x7f0000001a40)=0xc) lstat(&(0x7f0000001a80)='./file0\x00', &(0x7f0000001ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000001bc0)) fstat(0xffffffffffffffff, &(0x7f0000001c40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003a40)={{{@in=@dev, @in6=@dev}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000003b40)=0xe8) 03:33:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000004300)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000240), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0xfffffffffffffce7) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000980)={{{@in=@multicast1, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)={@remote}, &(0x7f0000002040)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'yam0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002280)={@local, @remote}, &(0x7f00000022c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f00000024c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002540)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002580)={0x0, @multicast2, @multicast1}, &(0x7f00000025c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000026c0)={{{@in, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002800)={@dev}, &(0x7f0000002840)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002980)={@mcast1}, &(0x7f00000029c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002a40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002a80)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000002b80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002c80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002cc0)={{{@in6=@ipv4={[], [], @loopback}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000002dc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002e00)={@remote, @local}, &(0x7f0000002e40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002e80)={{{@in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000002f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002fc0)={{{@in=@remote, @in=@rand_addr}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f00000030c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003100)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003140)={0x0, @remote, @remote}, &(0x7f0000003180)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003880)={&(0x7f0000000140), 0xc, &(0x7f0000003840)={&(0x7f0000000ac0)=ANY=[]}}, 0x0) request_key(&(0x7f00000004c0)='rxrpc_s\x00', &(0x7f0000000500), &(0x7f0000000540)="7465716c30000000763c24682727162d", 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 03:33:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000002c0)=@ipv6_getnetconf={0x1c, 0x52, 0x1, 0x0, 0x0, {}, [@NETCONFA_IFINDEX={0x8, 0x1, r2}]}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:33:25 executing program 3: fanotify_init(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@local}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000001c0)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000d00)=ANY=[], 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)}, 0x20) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f0000000400), &(0x7f00000005c0)=0x4) pivot_root(&(0x7f0000000540)='./file0\x00', &(0x7f0000000480)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000240), 0x4) pipe(&(0x7f0000000700)) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000040)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) sysfs$2(0x4, 0x0, &(0x7f0000000c40)=""/163) seccomp(0x0, 0x0, &(0x7f0000000680)={0x0, &(0x7f0000000600)}) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgget$private(0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000580)={0x0, &(0x7f0000000640)}) syz_execute_func(&(0x7f0000000a40)="428055a0376969ef69dc3641673e66450f1a970c000000c4c2958e0941b70f7f7f2766460f3828523044c19086d962788f35c935c97d197a07f3d3e979aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:25 executing program 4: keyctl$set_reqkey_keyring(0x14, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x400000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) 03:33:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) 03:33:25 executing program 3: msync(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x5) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) times(&(0x7f0000000080)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f0000000040)="8f6b657972696e672f2700", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'\x00', @ifru_addrs=@can}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000003c0)={@dev}, &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0x57) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @multicast2, @dev}, &(0x7f00000005c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@local, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000007c0)=0xfffffeed) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000d00)={'vcan0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000640)) getpeername$packet(0xffffffffffffff9c, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000440)=0x14) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000b00)) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x32) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000480), 0x10) syz_execute_func(&(0x7f00000003c0)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") fanotify_init(0x0, 0x0) getpriority(0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000a80)=ANY=[], &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x4) 03:33:25 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000001c0)=""/222, 0xde}, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) setsockopt(r0, 0x20000100000114, 0xa, &(0x7f00003cbffc)="02000000", 0x4) mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000adf000)={0x2, 0x0, @loopback}, 0x10) sendmsg$alg(r0, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) 03:33:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='devtmpfs\x00', 0x1, &(0x7f0000000440)="d7e8365659f3da2a41eacb216af9557568650a03cf76ea289e79e5a2137a7e9abf43dd8b81f0b916c72270b2a6e8142e1665126c0fd146d708f599733ab93790e5feee72499218cc3635d220dc8c83bdb401b3bdff72e5ffff697efd0d4fda40f1d27800199d54930575879be365fde22a9ff600a4aa66e46ce059724784ec0ede26a11791174a465b7007aa2d47225c513de55c59874bf6250e8cf3eff20e65589de95fd1e36d88ecd69d166e229b89f37ef983f3c7c3ecfc4c722e1ef24e319b68a899cc4d4aa9a86a479dfe421451cfb5189a48d947f59934fa42c0199621212d5c20489ef8f1a5") 03:33:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000002fc8)={&(0x7f0000000000)=@nl=@kern={0x10, 0x600}, 0x80, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a06000000a84306910000003900090035000c00060000001900150004000000000000dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 504.233100] tmpfs: No value for mount option '×è6VYóÚ*AêË!jùUuhe [ 504.233100] Ïvê(žyå¢z~š¿CÝ‹ð¹Ç"p²¦è.elÑF×õ™s:¹7åþîrI’Ì65Ò ÜŒƒ½´³½ÿråÿÿi~ý OÚ@ñÒx' [ 504.305585] tmpfs: No value for mount option '×è6VYóÚ*AêË!jùUuhe [ 504.305585] Ïvê(žyå¢z~š¿CÝ‹ð¹Ç"p²¦è.elÑF×õ™s:¹7åþîrI’Ì65Ò ÜŒƒ½´³½ÿråÿÿi~ý OÚ@ñÒx' [ 504.321731] netlink: 13 bytes leftover after parsing attributes in process `syz-executor2'. 03:33:25 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/4096, &(0x7f0000000340)=0x1000) lseek(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bcsf0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000000c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@local}}, 0xe8) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:25 executing program 2: gettid() syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6") write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)) accept(0xffffffffffffffff, &(0x7f0000000480)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000300)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) geteuid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000500)={0xa0}, 0xa0) creat(&(0x7f0000000040)='./file0\x00', 0x0) getuid() getgid() prctl$intptr(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000140)={0xa0}, 0xa0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000400)=@assoc_value, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in={{0x2, 0x0, @multicast1}}}, &(0x7f0000000740)=0x90) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037") 03:33:25 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x3ffff, 0x0) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8}, 0x5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='devtmpfs\x00', 0x1, &(0x7f0000000440)="d7e8365659f3da2a41eacb216af9557568650a03cf76ea289e79e5a2137a7e9abf43dd8b81f0b916c72270b2a6e8142e1665126c0fd146d708f599733ab93790e5feee72499218cc3635d220dc8c83bdb401b3bdff72e5ffff697efd0d4fda40f1d27800199d54930575879be365fde22a9ff600a4aa66e46ce059724784ec0ede26a11791174a465b7007aa2d47225c513de55c59874bf6250e8cf3eff20e65589de95fd1e36d88ecd69d166e229b89f37ef983f3c7c3ecfc4c722e1ef24e319b68a899cc4d4aa9a86a479dfe421451cfb5189a48d947f59934fa42c0199621212d5c20489ef8f1a5") [ 504.568058] tmpfs: No value for mount option '×è6VYóÚ*AêË!jùUuhe [ 504.568058] Ïvê(žyå¢z~š¿CÝ‹ð¹Ç"p²¦è.elÑF×õ™s:¹7åþîrI’Ì65Ò ÜŒƒ½´³½ÿråÿÿi~ý OÚ@ñÒx' 03:33:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='devtmpfs\x00', 0x1, &(0x7f0000000440)="d7e8365659f3da2a41eacb216af9557568650a03cf76ea289e79e5a2137a7e9abf43dd8b81f0b916c72270b2a6e8142e1665126c0fd146d708f599733ab93790e5feee72499218cc3635d220dc8c83bdb401b3bdff72e5ffff697efd0d4fda40f1d27800199d54930575879be365fde22a9ff600a4aa66e46ce059724784ec0ede26a11791174a465b7007aa2d47225c513de55c59874bf6250e8cf3eff20e65589de95fd1e36d88ecd69d166e229b89f37ef983f3c7c3ecfc4c722e1ef24e319b68a899cc4d4aa9a86a479dfe421451cfb5189a48d947f59934fa42c0199621212d5c20489ef8f1a5") 03:33:26 executing program 4: clock_getres(0x2, &(0x7f00000006c0)) times(&(0x7f0000000200)) memfd_create(&(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001700), &(0x7f0000001740)=0xc) getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) fstat(0xffffffffffffffff, &(0x7f0000001840)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000018c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d40)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000001e80)=0xffffffffffffff02) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in=@multicast2, @in=@loopback}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001b40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000600)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f00000016c0), 0x0, &(0x7f0000001c00)=ANY=[]}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000380)) nanosleep(&(0x7f0000000400), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)={'filter\x00'}, &(0x7f0000000080)=0x78) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000003c0), &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000004c0), &(0x7f0000000500)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000540)=ANY=[], &(0x7f0000000580)) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") [ 504.776435] tmpfs: No value for mount option '×è6VYóÚ*AêË!jùUuhe [ 504.776435] Ïvê(žyå¢z~š¿CÝ‹ð¹Ç"p²¦è.elÑF×õ™s:¹7åþîrI’Ì65Ò ÜŒƒ½´³½ÿråÿÿi~ý OÚ@ñÒx' 03:33:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='devtmpfs\x00', 0x1, &(0x7f0000000440)="d7e8365659f3da2a41eacb216af9557568650a03cf76ea289e79e5a2137a7e9abf43dd8b81f0b916c72270b2a6e8142e1665126c0fd146d708f599733ab93790e5feee72499218cc3635d220dc8c83bdb401b3bdff72e5ffff697efd0d4fda40f1d27800199d54930575879be365fde22a9ff600a4aa66e46ce059724784ec0ede26a11791174a465b7007aa2d47225c513de55c59874bf6250e8cf3eff20e65589de95fd1e36d88ecd69d166e229b89f37ef983f3c7c3ecfc4c722e1ef24e319b68a899cc4d4aa9a86a479dfe421451cfb5189a48d947f59934fa42c0199621212d5c20489ef8f1a5") [ 504.983293] tmpfs: No value for mount option '×è6VYóÚ*AêË!jùUuhe [ 504.983293] Ïvê(žyå¢z~š¿CÝ‹ð¹Ç"p²¦è.elÑF×õ™s:¹7åþîrI’Ì65Ò ÜŒƒ½´³½ÿråÿÿi~ý OÚ@ñÒx' [ 505.019029] cgroup: fork rejected by pids controller in /syz3 03:33:26 executing program 5: dup(0xffffffffffffffff) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) getpgrp(0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4000) fallocate(r0, 0x0, 0x0, 0x7) write$cgroup_int(r0, &(0x7f0000000000)=ANY=[], 0x10000001b) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1, 0x800000000044031, 0xffffffffffffffff, 0x0) 03:33:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) unshare(0x10030600) r0 = socket(0x10, 0x2, 0xc) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000100)={0x7ff, {{0xa, 0x4e20, 0x0, @mcast2}}}, 0x88) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a") sendfile(r0, r1, &(0x7f00000000c0), 0x80000002) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 03:33:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz1\x00', 0x19}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 03:33:26 executing program 1: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340), &(0x7f0000000380)=0x8) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffc, 0x1, &(0x7f0000000000)=[{&(0x7f00000001c0)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3fc39048f752c5725f4000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000180)) [ 505.477190] input: syz1 as /devices/virtual/input/input9 03:33:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000300)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7c421245f110f8c0c0000000703") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0x18) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @dev, @dev}, &(0x7f0000000d00)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000081c0)={@broadcast, @local}, &(0x7f0000008200)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008340)={{{@in=@broadcast, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000008440)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000008480)=@can, &(0x7f0000008500)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008a40)={'bcsf0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000008a80)=@can, &(0x7f0000008b00)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000c8c0), 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ca00)={{{@in6=@ipv4={[], [], @loopback}, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f000000cb00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000cb40)={0x0, @remote, @multicast1}, &(0x7f000000cb80)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000cbc0)={@loopback}, &(0x7f000000cc00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000cc40)={'team_slave_0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000cc80)={'ifb0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000ccc0)={@empty, @multicast1}, &(0x7f000000cd00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000cd40), &(0x7f000000cd80)=0x14, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000013680), 0x0, 0x0, &(0x7f0000013880)={0x77359400}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") [ 505.584906] input: syz1 as /devices/virtual/input/input10 [ 505.595119] XFS (loop1): Mounting V4 Filesystem [ 505.657549] attempt to access beyond end of device [ 505.662826] loop1: rw=4096, want=64416650557953, limit=264192 [ 505.680549] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x3a962b92fa00 len 1 error 5 [ 505.711096] XFS (loop1): empty log check failed 03:33:27 executing program 5: dup(0xffffffffffffffff) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) getpgrp(0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4000) fallocate(r0, 0x0, 0x0, 0x7) write$cgroup_int(r0, &(0x7f0000000000)=ANY=[], 0x10000001b) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1, 0x800000000044031, 0xffffffffffffffff, 0x0) 03:33:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz1\x00', 0x19}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 505.751700] XFS (loop1): log mount/recovery failed: error -5 [ 505.768768] XFS (loop1): log mount failed [ 505.898438] input: syz1 as /devices/virtual/input/input11 03:33:27 executing program 1: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340), &(0x7f0000000380)=0x8) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffc, 0x1, &(0x7f0000000000)=[{&(0x7f00000001c0)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3fc39048f752c5725f4000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000180)) 03:33:27 executing program 0: dup(0xffffffffffffffff) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) getpgrp(0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4000) fallocate(r0, 0x0, 0x0, 0x7) write$cgroup_int(r0, &(0x7f0000000000)=ANY=[], 0x10000001b) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1, 0x800000000044031, 0xffffffffffffffff, 0x0) 03:33:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz1\x00', 0x19}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 03:33:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioprio_get$pid(0x0, 0x0) unshare(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x7, &(0x7f0000000080)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) getpid() ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 506.192776] XFS (loop1): Mounting V4 Filesystem [ 506.227839] input: syz1 as /devices/virtual/input/input12 [ 506.254711] attempt to access beyond end of device 03:33:27 executing program 3: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 506.286074] loop1: rw=4096, want=64416650557953, limit=264192 [ 506.313094] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x3a962b92fa00 len 1 error 5 [ 506.328842] XFS (loop1): empty log check failed [ 506.334915] XFS (loop1): log mount/recovery failed: error -5 [ 506.380717] XFS (loop1): log mount failed 03:33:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz1\x00', 0x19}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 03:33:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioprio_get$pid(0x0, 0x0) unshare(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x7, &(0x7f0000000080)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) getpid() ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:33:28 executing program 1: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340), &(0x7f0000000380)=0x8) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffc, 0x1, &(0x7f0000000000)=[{&(0x7f00000001c0)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3fc39048f752c5725f4000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000180)) [ 506.609907] input: syz1 as /devices/virtual/input/input13 03:33:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioprio_get$pid(0x0, 0x0) unshare(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x7, &(0x7f0000000080)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) getpid() ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:33:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioprio_get$pid(0x0, 0x0) unshare(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x7, &(0x7f0000000080)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) getpid() ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:33:28 executing program 5: dup(0xffffffffffffffff) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) getpgrp(0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4000) fallocate(r0, 0x0, 0x0, 0x7) write$cgroup_int(r0, &(0x7f0000000000)=ANY=[], 0x10000001b) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1, 0x800000000044031, 0xffffffffffffffff, 0x0) [ 506.934660] XFS (loop1): Mounting V4 Filesystem [ 506.956468] attempt to access beyond end of device 03:33:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioprio_get$pid(0x0, 0x0) unshare(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x7, &(0x7f0000000080)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) getpid() ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:33:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioprio_get$pid(0x0, 0x0) unshare(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x7, &(0x7f0000000080)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) getpid() ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 507.004120] loop1: rw=4096, want=64416650557953, limit=264192 [ 507.040508] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x3a962b92fa00 len 1 error 5 [ 507.087636] XFS (loop1): empty log check failed [ 507.101869] XFS (loop1): log mount/recovery failed: error -5 [ 507.162004] XFS (loop1): log mount failed 03:33:28 executing program 0: dup(0xffffffffffffffff) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) getpgrp(0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4000) fallocate(r0, 0x0, 0x0, 0x7) write$cgroup_int(r0, &(0x7f0000000000)=ANY=[], 0x10000001b) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1, 0x800000000044031, 0xffffffffffffffff, 0x0) 03:33:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioprio_get$pid(0x0, 0x0) unshare(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x7, &(0x7f0000000080)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) getpid() ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:33:28 executing program 4: getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000940)={{{@in=@dev, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000a40)=0xe8) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f0000001400)) lstat(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000001540)='bdev#vboxnet1!mime_type\x00'}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) getgid() fstat(0xffffffffffffffff, &(0x7f0000001800)) getgroups(0x0, &(0x7f0000001880)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000019c0)=0xe8) lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002ec0)={{{@in=@dev, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000002fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003000), &(0x7f0000003040)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003080)={{}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000003180)=0xe8) stat(&(0x7f00000031c0)='./file0\x00', &(0x7f0000003200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003280)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000003380)=0xe8) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:28 executing program 3: rt_sigpending(&(0x7f0000000140), 0x8) sysfs$1(0x1, &(0x7f00000000c0)='trusted.overlay.upper\x00') socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000b40)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000002100)) prctl$setname(0xf, &(0x7f0000001840)='\x00') ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000001940)={'tunl0\x00', {0x2, 0x0, @multicast1}}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) vmsplice(0xffffffffffffffff, &(0x7f0000001740), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f0000001800)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) mlock2(&(0x7f0000bfd000/0x400000)=nil, 0x400000, 0x0) clock_gettime(0x0, &(0x7f0000000140)) recvmsg(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000001880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001d40), 0x0, &(0x7f0000001dc0)=""/181, 0xb5}, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:33:28 executing program 1: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340), &(0x7f0000000380)=0x8) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffc, 0x1, &(0x7f0000000000)=[{&(0x7f00000001c0)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3fc39048f752c5725f4000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000180)) 03:33:28 executing program 2: clock_getres(0x2, &(0x7f00000002c0)) times(&(0x7f0000000200)) memfd_create(&(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") [ 507.742662] XFS (loop1): Mounting V4 Filesystem [ 507.768475] attempt to access beyond end of device [ 507.781709] loop1: rw=4096, want=64416650557953, limit=264192 [ 507.788070] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x3a962b92fa00 len 1 error 5 [ 507.831462] XFS (loop1): empty log check failed [ 507.857963] XFS (loop1): log mount/recovery failed: error -5 [ 507.886273] XFS (loop1): log mount failed 03:33:29 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xf, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x27}}, &(0x7f0000000040)='GPL\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) 03:33:29 executing program 5: dup(0xffffffffffffffff) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) getpgrp(0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4000) fallocate(r0, 0x0, 0x0, 0x7) write$cgroup_int(r0, &(0x7f0000000000)=ANY=[], 0x10000001b) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1, 0x800000000044031, 0xffffffffffffffff, 0x0) 03:33:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000), 0xc, &(0x7f0000c8d000)={&(0x7f0000bfdfdc)={0x14, 0x2, 0x1, 0x800000001}, 0x14}}, 0x0) 03:33:29 executing program 0: dup(0xffffffffffffffff) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) getpgrp(0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4000) fallocate(r0, 0x0, 0x0, 0x7) write$cgroup_int(r0, &(0x7f0000000000)=ANY=[], 0x10000001b) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1, 0x800000000044031, 0xffffffffffffffff, 0x0) 03:33:29 executing program 1: clock_getres(0x2, &(0x7f00000002c0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x0, 0x0) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "816d906c8100e4c26a7dcdfac0d5cf79424e8ffe90ad05a58951f78290050ddd9f46f804f303ffcfb9ebb76d436bc04967ae7af381a2fcda0a77f3bc977140"}, 0x60) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syncfs(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000140)=""/70) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") 03:33:30 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) 03:33:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x3}, 0x1c) listen(r1, 0x2) r2 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x3, @loopback}, 0x10) 03:33:30 executing program 3: io_setup(0x80, &(0x7f0000000240)) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000480)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f00000004c0)={'ipvs\x00'}, &(0x7f0000000500)=0x1e) finit_module(0xffffffffffffffff, &(0x7f00000003c0)="73797374656d99656d31242ec600", 0x0) syz_emit_ethernet(0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000040)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000180)={@dev, @rand_addr}, &(0x7f00000001c0)=0xc) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:30 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) 03:33:30 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) 03:33:30 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) 03:33:30 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) 03:33:30 executing program 1: setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x1, "7457526c3000010000000100"}, 0xb) add_key(&(0x7f0000000080)='ceph\x00', &(0x7f0000000040), &(0x7f0000000000), 0x1fe, 0xffffffffffffffff) 03:33:30 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) 03:33:30 executing program 5: unshare(0x2000400) r0 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000140)={0x0, 0x0, 0x1, 0x0, 0x0, [{r0}]}) 03:33:30 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:33:30 executing program 1: io_destroy(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000340)=0xc) gettid() openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000380)='cpu.weight.nice\x00', 0x2, 0x0) gettid() openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ftruncate(0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./bus\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:33:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') preadv(r0, &(0x7f0000000480), 0x20000000000002af, 0x7ffffffff000) 03:33:31 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) 03:33:31 executing program 3: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) fsync(0xffffffffffffffff) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=0x4) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000200)={0x0, @broadcast, @remote}, &(0x7f00000002c0)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) chroot(&(0x7f0000004140)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:33:31 executing program 2: prctl$setmm(0x2f, 0x0, &(0x7f0000ffc000/0x4000)=nil) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) syz_execute_func(&(0x7f00000001c0)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501eea4a4a3b786e2989fc4227992749f55") socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040)={{0x0, @multicast2, 0x0, 0x0, 'none\x00'}, {@loopback}}, 0x44) getpid() 03:33:31 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x20000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)}) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) futex(&(0x7f0000000380), 0x5, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f00000005c0), 0x0) openat(0xffffffffffffffff, &(0x7f00000018c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffffa) add_key(&(0x7f0000000580)='user\x00', &(0x7f00000006c0), 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000600)=0x1c) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x6, 0x0) syz_execute_func(&(0x7f0000000240)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:31 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000000079) ioctl$KVM_SET_CPUID(r0, 0xc0105502, &(0x7f0000000080)=ANY=[]) 03:33:31 executing program 4: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'bpq0\x00'}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000600)='/dev/zero\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@mcast1, @in6=@ipv4={[], [], @dev}}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000003c80)={&(0x7f00000005c0), 0xc, &(0x7f0000003c40)={&(0x7f00000007c0)={0x14}, 0x14}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @empty, @empty, @dev}}}}, &(0x7f0000000400)) setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, &(0x7f00000003c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000500), &(0x7f0000000540)=0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4b2c19086d9f28fc9c401ed6aa3a4c60000c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:32 executing program 1: pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) pipe(&(0x7f0000000000)) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) vmsplice(0xffffffffffffffff, &(0x7f0000f6dfe0), 0x0, 0x0) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000100)={0x14}, 0x14) read(0xffffffffffffffff, &(0x7f0000000040)=""/184, 0xb8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:33:32 executing program 2: init_module(&(0x7f0000000040)='&keyring\x00', 0x9, &(0x7f00000000c0)="2918656d3025657468306367726f757024406d696d655f747970655b47504c6d643573756d2321656d31766d6e6574312e00") clock_getres(0x0, &(0x7f00000001c0)) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f21efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 511.000153] audit: type=1326 audit(2000000012.450:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16287 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:32 executing program 3: syz_emit_ethernet(0x1c0, &(0x7f0000000140)={@random="f1cec3281d34", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bea295", 0x0, "d20434"}}}}}}, &(0x7f0000000280)) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000003c0)=""/59, 0xffffffffffffff44, 0x0, 0x0, 0x2d2) delete_module(&(0x7f0000000040)='(}\x00', 0x0) pipe(&(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000006c0)={0x0, {{0x2, 0x0, @remote}}}, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@local}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40), &(0x7f0000001a80)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000400)={@dev}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@loopback}, &(0x7f0000001b00)=0x14) accept(0xffffffffffffff9c, &(0x7f0000000340)=@xdp, &(0x7f0000001bc0)=0x80) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001c40)={@remote, @multicast2}, &(0x7f0000001c80)=0xc) accept$packet(0xffffffffffffff9c, &(0x7f0000001d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001d40)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000001d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001dc0)=0x14, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001f00)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002040)={{{@in=@broadcast, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000002140)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6, @in6}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002340)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000800)={@ipv4={[], [], @local}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000002880)={&(0x7f00000000c0), 0xc, &(0x7f0000002840)={&(0x7f0000002380)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:32 executing program 4: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000006c0)={{}, {0x77359400}}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000280)=""/253) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000480)) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000001c0)) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000042c0)={@broadcast}, &(0x7f0000004300)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000004340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004380)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000043c0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004400)={{{@in6=@local, @in=@local}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000004500)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004580)={@local}, &(0x7f00000045c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004600)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004640)={{{@in=@remote, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000004740)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000004780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000047c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004800)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004840)={{{@in=@local, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000004940)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004a80)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000004ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004b00)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000004c80)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004cc0)={0x0, @multicast1, @loopback}, &(0x7f0000004d00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000004d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004dc0)={{{@in=@multicast1, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000004ec0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000004f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004f40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000004f80), &(0x7f0000004fc0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000005000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005040)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005080)={@dev, @loopback}, &(0x7f00000050c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007780)={@empty, @dev}, &(0x7f00000077c0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000007800), &(0x7f0000007840)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000093c0), 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000009780)={0x0, @empty, @local}, &(0x7f00000097c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000cc80)={'veth1_to_bond\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000e100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000e140)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000e180)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f000000e280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000e2c0)={{{@in, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f000000e3c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000e400)={{{@in=@multicast2, @in=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f000000e500)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:32 executing program 0: socket$inet(0x2, 0xa, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000740)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00'}, 0x118) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000600), 0x4) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000580)) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000b00)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:33:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') preadv(r0, &(0x7f0000000480), 0x20000000000002af, 0x7ffffffff000) [ 511.758769] audit: type=1326 audit(2000000013.210:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16287 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:33 executing program 1: recvmmsg(0xffffffffffffff9c, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgrp(0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in, @in6=@mcast1}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getgid() signalfd4(0xffffffffffffffff, &(0x7f0000000780), 0x8, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in, @in=@loopback}}, {{@in6=@dev}}}, &(0x7f00000008c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000a40)) geteuid() stat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001140)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000001240)=0xe8) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001340)={{{@in6=@mcast2, @in6}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000001440)=0xe8) getgroups(0x0, &(0x7f0000001480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002740)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000002840)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002880)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003340)={{{@in=@local, @in6=@mcast2}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000003440)=0xe8) getgid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000003480)) getresuid(&(0x7f0000003500), &(0x7f0000003540), &(0x7f0000003580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003640), &(0x7f0000003680), &(0x7f00000036c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003700), &(0x7f0000003740)=0xc) getresuid(&(0x7f0000003780), &(0x7f00000037c0), &(0x7f0000003800)) getegid() syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1a0f1808e29866450ff61f7f") 03:33:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x3d7, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000080)=""/45) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x3, @local}}, 0x1e) connect$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 03:33:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x2, 0x3, 0x40000000000000ff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='sit0\x00', 0x10) sendto$inet(r1, &(0x7f0000000000), 0x3c2, 0xfd04, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) 03:33:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x3d7, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000080)=""/45) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x3, @local}}, 0x1e) connect$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 03:33:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x3d7, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000080)=""/45) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x3, @local}}, 0x1e) connect$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 03:33:33 executing program 0: socket$inet(0x2, 0xa, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000740)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00'}, 0x118) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000600), 0x4) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000580)) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000b00)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:33:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x3d7, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000080)=""/45) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x3, @local}}, 0x1e) connect$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 03:33:34 executing program 3: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getegid() getegid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x3d7, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000080)=""/45) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x3, @local}}, 0x1e) connect$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 03:33:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') preadv(r0, &(0x7f0000000480), 0x20000000000002af, 0x7ffffffff000) 03:33:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x3d7, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000080)=""/45) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x3, @local}}, 0x1e) connect$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 03:33:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x3d7, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000080)=""/45) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x3, @local}}, 0x1e) connect$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 03:33:35 executing program 1: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') syz_open_dev$usb(&(0x7f0000000940)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f00000003c0)='veth1_to_team\x00', 0xffffffffffffffff}, 0x30) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000900)={0x0, 0x0, 0xffffffffffffff9c}) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0xffffffffffffffff}, 0xc) creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) mount(0xfffffffffffffffd, &(0x7f0000000980)='./file0\x00', &(0x7f0000000300)='a\t\x00\x00\x00q\x00', 0x0, &(0x7f0000000ac0)='\x00') mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='.', &(0x7f00000000c0)='hugetlbfs\x00', 0x0, &(0x7f0000000700)) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000400)={0x18, 0x0, {0x0, @broadcast, 'veth1_to_team\x00'}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000440)) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000b00)='IPVS\x00') stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getuid() prctl$setmm(0x23, 0x0, &(0x7f0000ffb000/0x3000)=nil) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) getuid() getgroups(0x0, &(0x7f0000000880)) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000b40)=ANY=[], &(0x7f00000009c0)) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x0, @loopback}}}, 0x84) lsetxattr$system_posix_acl(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000002c0), 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:35 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000100), 0xffffffffffffffd6, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = socket$inet(0x10, 0x3, 0x4) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001200ff09fffefd956fa264b724a6007e00000000000000683540150024001d001fc41180b598be593ab6821148a730bb1aa49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) close(r0) 03:33:35 executing program 0: socket$inet(0x2, 0xa, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000740)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00'}, 0x118) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000600), 0x4) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000580)) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000b00)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:33:35 executing program 3: clock_gettime(0x5, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000580), &(0x7f00000006c0), 0x0, 0xfffffffffffffff8) keyctl$set_timeout(0xf, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000180)) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getpgid(0x0) getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000640)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000000c0)={0x0, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) add_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380), &(0x7f0000000540), 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280), &(0x7f0000000440), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) geteuid() eventfd(0x0) getpgrp(0xffffffffffffffff) creat(&(0x7f0000000200)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getxattr(&(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)=@known='system.sockprotoname\x00', &(0x7f0000000600)=""/44, 0x2c) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000005c0)="c402e5be03e9d92a5c41ff0f183714441821c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1ecc7f") 03:33:35 executing program 4: recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="0c42805da03e3eef69dc400f1a8705340000ce73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002067f00fbab204000000ca6b2179dae5e54175453666362666420f3a6040037bc4010d64ac1e5d31a3b744dbe271fb0703") [ 513.746350] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:33:35 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xfffffffb) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000001e00)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) gettid() getuid() getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000018c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001900)={{{@in=@remote, @in6}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000001a00)=0xe8) getresgid(&(0x7f0000001a40), &(0x7f0000001a80), &(0x7f0000001ac0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001b00)={{{@in6, @in=@broadcast}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@local}}, &(0x7f0000001c00)=0xe8) lstat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001dc0), 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:35 executing program 3: futex(&(0x7f0000000440), 0x5, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getuid() getresuid(&(0x7f0000000340), &(0x7f0000000740), &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./file0/../file0\x00', &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getgid() lstat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000cc0), 0x24, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:36 executing program 3: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000840)={0x0, @speck128}) finit_module(0xffffffffffffffff, &(0x7f0000000600)='yeah\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000640)=""/101, &(0x7f0000000380)=0x65) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000800)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880), &(0x7f0000000940)=0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000740)={0xa0}, 0xa0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000003c0)={{}, 'syz0\x00'}) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x2) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:33:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') preadv(r0, &(0x7f0000000480), 0x20000000000002af, 0x7ffffffff000) 03:33:36 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000100), 0xffffffffffffffd6, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = socket$inet(0x10, 0x3, 0x4) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001200ff09fffefd956fa264b724a6007e00000000000000683540150024001d001fc41180b598be593ab6821148a730bb1aa49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) close(r0) 03:33:36 executing program 0: socket$inet(0x2, 0xa, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000740)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00'}, 0x118) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000600), 0x4) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000580)) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000b00)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:33:36 executing program 4: clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000940)={{{@in, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000a40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a80)={@local}, &(0x7f0000000ac0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b80)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000000bc0)=@xdp, &(0x7f0000000c40)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000cc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@multicast1, @in=@dev}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000b00)=0xffffffffffffffb9) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000840), 0xc, &(0x7f0000001180)={&(0x7f0000000f80)={0x14}, 0x14}}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timerfd_create(0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) rt_sigreturn() clock_gettime(0x0, &(0x7f0000000080)) utimensat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{}, {0x0, 0x7530}}, 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in, @in6=@dev}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000480)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@dev}, &(0x7f0000000800)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e80)={{{@in=@remote, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000e40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000008c0)={'vcan0\x00'}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) sched_rr_get_interval(0x0, &(0x7f0000000880)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) [ 514.787143] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:33:36 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffe) pipe(&(0x7f00000001c0)) clock_getres(0x0, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000006c0)={'TPROXY\x00'}, &(0x7f0000000700)=0x1e) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x12, 0x5, 0xfa00, {&(0x7f00000008c0)}}, 0x18) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) 03:33:37 executing program 3: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000840)={0x0, @speck128}) finit_module(0xffffffffffffffff, &(0x7f0000000600)='yeah\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000640)=""/101, &(0x7f0000000380)=0x65) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000800)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880), &(0x7f0000000940)=0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000740)={0xa0}, 0xa0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000003c0)={{}, 'syz0\x00'}) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x2) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:33:37 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000100), 0xffffffffffffffd6, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = socket$inet(0x10, 0x3, 0x4) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001200ff09fffefd956fa264b724a6007e00000000000000683540150024001d001fc41180b598be593ab6821148a730bb1aa49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) close(r0) 03:33:37 executing program 0: gettid() socket$packet(0x11, 0x0, 0x300) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000280)=""/125, &(0x7f0000000300)=0x7d) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000040), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) getgid() syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") getpid() stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/mnt\x00') gettid() setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000016c0), &(0x7f0000001700)=0xc) getresgid(&(0x7f0000001740), &(0x7f0000001780), &(0x7f00000017c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001840)={{{@in6=@ipv4={[], [], @broadcast}, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000001940)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001ac0), 0x171, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)}, 0x20) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000740)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='cgroup.type\x00'}, 0x10) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) epoll_create1(0x0) rt_sigaction(0x0, &(0x7f0000000540)={&(0x7f00000003c0)="c4c2b5aa76eac421b1f1a8fda00000660f3835dc64660f383a2cfcf345a7c4c228f2390f1dc44487568c2e420fd904a9c463695fe004", {}, 0x0, &(0x7f0000000500)="c4426129d864460f71d600450fb2bba6000000c4622592a4b7eb00000083eb34c46201033b0f42c842c6f806c4a2e5ac49070f0e"}, &(0x7f0000000640)={&(0x7f0000000580)="c4e1c65c37c441edf6b901000000c4e1e55eea400fc2601006479f8ceac403a1791300660ffe07c481855db7060000000f9fab0b000000", {}, 0x0, &(0x7f00000005c0)="3e46efd88c61000000806566450f3a0da2751a4e2000c401fd5182fcffffff480fae250210000066470f1727c4a1f166619fc4a17a10a3000880412666430f751e44c10396"}, 0x8, &(0x7f0000000680)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 515.724480] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:33:37 executing program 0: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000001540)='IPVS\x00', 0xffffffffffffff9c}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000440)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e00)={0x0, @rand_addr, @rand_addr}, &(0x7f0000000e40)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001000), &(0x7f0000001040)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001080)={{{@in6=@ipv4={[], [], @loopback}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000001180)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000011c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001280)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000012c0)={@multicast2, @remote}, &(0x7f0000001300)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001380)=0x14, 0x0) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='overlay\x00', 0x0, 0x0) [ 516.264547] overlayfs: missing 'lowerdir' 03:33:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r1, &(0x7f0000000700)="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", 0x4c3, 0x8000, &(0x7f00000005c0)={0xa, 0x3, 0x0, @mcast2}, 0x1c) sendto$inet6(r1, &(0x7f0000000000)="078195770684a97ec6071c6426f24f6381202674c2567864ecfa48ca593b414be0056e4fa1a5a9e43718a472b623b451f0ffa38c5ed89334f5df1e5791926a5bec9675977918454c2988c0516d8e4b3557426750482804a3870e8c16b5621767a100b988a1a905f9c472c43656b7071421b0b2afc3781384d5f3205c276e0dffbaf14bb9220bd8f911291ba8828d125fae5e6b7752c2f7462d7534c1de0d5d46fe1e37d1512ceac522b4858f71669f3542197c5a3f87d766fd4fb9127e5151a5197aeb79e20e1c546fbae6be5da95d436cf1e0723fe74592cb5fe414d7ad", 0xde, 0x8000, &(0x7f0000000100), 0x1c) write(r1, &(0x7f00000003c0)="679294a82c94a09830a9d437", 0xc) 03:33:37 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x200, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000003c0)=@raw, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, &(0x7f0000000480)}, 0x48) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xffffffffffffff9c}) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getpgrp(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clock_gettime(0x0, &(0x7f0000000500)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000180)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001bc0)) fstat(0xffffffffffffffff, &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getpid() socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:37 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000380)='cgroup.controllers\x00', 0x0, 0x0) read(r1, &(0x7f0000000000)=""/222, 0xde) 03:33:37 executing program 3: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000840)={0x0, @speck128}) finit_module(0xffffffffffffffff, &(0x7f0000000600)='yeah\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000640)=""/101, &(0x7f0000000380)=0x65) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000800)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880), &(0x7f0000000940)=0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000740)={0xa0}, 0xa0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000003c0)={{}, 'syz0\x00'}) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x2) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:33:38 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") dup3(r0, r1, 0x0) 03:33:38 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000100), 0xffffffffffffffd6, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = socket$inet(0x10, 0x3, 0x4) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001200ff09fffefd956fa264b724a6007e00000000000000683540150024001d001fc41180b598be593ab6821148a730bb1aa49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) close(r0) 03:33:38 executing program 5: memfd_create(&(0x7f0000000380)='asymmetric\x00', 0x0) syncfs(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000500)=0x24) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'U-', 0x7}, 0x28, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000540)={@empty, @link_local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @loopback, @link_local, @mcast2}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001800), &(0x7f0000001840)=0xc) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900)) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001dc0)) fstat(0xffffffffffffffff, &(0x7f0000001e00)) getgid() getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002200), &(0x7f0000002240)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002280), &(0x7f00000022c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002300)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000002400)=0xe8) getegid() getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002440)={{{@in6=@dev, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000002540)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002180)) getresuid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0)) lstat(&(0x7f0000002700)='./file0\x00', &(0x7f0000002740)) getpid() geteuid() stat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) stat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002d80)) fstat(0xffffffffffffffff, &(0x7f0000002dc0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000032c0)='\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003340)={{{@in=@remote, @in6=@remote}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000003440)=0xe8) getgroups(0x0, &(0x7f0000003480)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000034c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f0000005a80)='./file0\x00', &(0x7f0000005ac0)) fstat(0xffffffffffffffff, &(0x7f0000005b40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005bc0)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000005cc0)=0xe8) getresgid(&(0x7f0000005d00), &(0x7f0000005d40), &(0x7f0000005d80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005e00), 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 516.695397] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:33:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x90}]}, &(0x7f0000000000)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f0000000040)=""/251}, 0x48) 03:33:38 executing program 4: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000004c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000ac0)={@local}, &(0x7f0000000b00)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000b40)={'vcan0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e40)={0x0, @multicast1, @dev}, &(0x7f0000000e80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002c40)={0x0, @broadcast}, &(0x7f0000002c80)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002d00)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000002d40), &(0x7f0000002d80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000041c0)={@loopback}, &(0x7f0000004200)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000004280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004300)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004340)={{{@in6=@ipv4={[], [], @local}, @in6}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000004440)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000004880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000048c0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000aa40), 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ab80)={{{@in6, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f000000ac80)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000001bb00), 0x0, 0x0, &(0x7f000001bd40)={0x77359400}) getpeername(0xffffffffffffffff, &(0x7f000001bd80)=@can, &(0x7f000001be00)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000001be40)={@dev, @dev}, &(0x7f000001be80)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f000001e780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000001e7c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000001e800)={@mcast1}, &(0x7f000001e840)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000001e880)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @broadcast}, &(0x7f0000000bc0)=0xfffffe1d) accept$packet(0xffffffffffffff9c, &(0x7f000001ee00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000001ee40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000001ee80)={{{@in, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f000001ef80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000001efc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000001f280)={0x0, @multicast2, @remote}, &(0x7f000001f2c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000001f540)={{{@in=@multicast2, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f000001f640)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f000001f740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000001f780)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f000001f9c0), &(0x7f000001fa00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000001fb00)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000001fc00)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000001fd00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000020080)={{{@in6, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000020180)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000020280)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000020380)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000020e40)={&(0x7f00000002c0), 0xc, &(0x7f0000020e00)={&(0x7f00000203c0)={0x14}, 0x14}}, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000080)) prctl$void(0x0) getgroups(0x0, &(0x7f0000000a00)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/udp\x00') getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:38 executing program 0: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000200)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000a80)) syz_genetlink_get_family_id$team(&(0x7f0000000d40)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xffffffffffffff3f) 03:33:38 executing program 1: keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0xc) add_key(&(0x7f0000001940)='id_legacy\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffe) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) execve(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340), &(0x7f0000000400)) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000140), 0x4) chmod(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f0000000440)=0xffffffffffffff76) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:38 executing program 3: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000840)={0x0, @speck128}) finit_module(0xffffffffffffffff, &(0x7f0000000600)='yeah\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000640)=""/101, &(0x7f0000000380)=0x65) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000800)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880), &(0x7f0000000940)=0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000740)={0xa0}, 0xa0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000003c0)={{}, 'syz0\x00'}) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x2) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:33:39 executing program 2: getrusage(0xffffffffffffffff, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") pipe2(&(0x7f0000000040), 0x0) stat(&(0x7f0000000440)='./file0\x00', &(0x7f00000009c0)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000380)='./file0\x00'}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f00000008c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000000580)) getgroups(0x0, &(0x7f0000000640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f00000004c0)={0x0, @aes256}) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000840)) getgroups(0x0, &(0x7f00000008c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) setxattr$system_posix_acl(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='system.posix_acl_access\x00', &(0x7f0000000980)=ANY=[], 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) exit_group(0x0) 03:33:39 executing program 5: keyctl$dh_compute(0x3, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000002f00)=""/4096, &(0x7f0000000600)=0x1321) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000040)=""/116, 0x74, 0x0, &(0x7f00000000c0), 0x10) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:39 executing program 2: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@random="014d06cb8916", @random="471a32d2e30c", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4000, 0x4e21, 0x8}}}}}, 0x0) 03:33:39 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000e5bff6)='/dev/dsp#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f00000015c0)) poll(&(0x7f0000004a80)=[{r0}], 0x1, 0x204) 03:33:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="390000001300090468feedffffbf6dff0600ff3f03000000450001070000001419001a000500020007000a000200000800005d14a4e91ee438", 0x39}], 0x1) [ 517.955651] netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. [ 517.994523] netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. 03:33:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="390000001300090468feedffffbf6dff0600ff3f03000000450001070000001419001a000500020007000a000200000800005d14a4e91ee438", 0x39}], 0x1) 03:33:39 executing program 0: times(&(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001180)) syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000600)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f0000001040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000680)={&(0x7f0000000780)=ANY=[]}}, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000580)) getegid() getgroups(0x0, &(0x7f0000000600)) getgroups(0x0, &(0x7f0000000640)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000f40)) [ 518.148644] netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. [ 518.186261] netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. 03:33:39 executing program 1: add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240), &(0x7f0000000340), 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xfffffffffffffff8) keyctl$dh_compute(0xb, &(0x7f0000000540), &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000280)={&(0x7f00000001c0)={'tgr128-generic\x00'}, 0x0, 0xfea4}) geteuid() syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180), 0x4) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), 0x1) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="390000001300090468feedffffbf6dff0600ff3f03000000450001070000001419001a000500020007000a000200000800005d14a4e91ee438", 0x39}], 0x1) 03:33:39 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000200)) keyctl$set_reqkey_keyring(0x10, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000040)) accept$packet(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=0x14) clock_getres(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) [ 518.360365] netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. [ 518.399876] netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. 03:33:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="390000001300090468feedffffbf6dff0600ff3f03000000450001070000001419001a000500020007000a000200000800005d14a4e91ee438", 0x39}], 0x1) 03:33:39 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000e5bff6)='/dev/dsp#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f00000015c0)) poll(&(0x7f0000004a80)=[{r0}], 0x1, 0x204) [ 518.510139] netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. [ 518.550674] netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. 03:33:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000002a40)={0x12, 0x3, &(0x7f0000000200), &(0x7f0000000240)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000280)=""/225, 0x0, 0x0, [], 0x0, 0xf000000}, 0x48) 03:33:40 executing program 2: setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @local}}}, 0x84) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x48000000) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x52b, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}]}, 0x1c}}, 0x0) [ 518.760825] netlink: 'syz-executor2': attribute type 4 has an invalid length. 03:33:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x10000000000002) [ 518.803088] netlink: 'syz-executor2': attribute type 4 has an invalid length. 03:33:40 executing program 2: setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @local}}}, 0x84) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x48000000) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x52b, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}]}, 0x1c}}, 0x0) 03:33:40 executing program 5: setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @local}}}, 0x84) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x48000000) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x52b, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}]}, 0x1c}}, 0x0) 03:33:40 executing program 5: setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @local}}}, 0x84) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x48000000) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x52b, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}]}, 0x1c}}, 0x0) [ 518.952851] netlink: 'syz-executor2': attribute type 4 has an invalid length. [ 518.975451] netlink: 'syz-executor5': attribute type 4 has an invalid length. [ 519.083274] netlink: 'syz-executor5': attribute type 4 has an invalid length. 03:33:40 executing program 0: times(&(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001180)) syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000600)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f0000001040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000680)={&(0x7f0000000780)=ANY=[]}}, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000580)) getegid() getgroups(0x0, &(0x7f0000000600)) getgroups(0x0, &(0x7f0000000640)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000f40)) 03:33:40 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000009000)='/dev/audio\x00', 0x40202, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/15, 0xf}], 0x1) dup2(r2, r1) io_setup(0x5, &(0x7f0000000280)=0x0) io_submit(r3, 0x1, &(0x7f0000002740)=[&(0x7f00000014c0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f00000004c0)}]) 03:33:40 executing program 2: setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @local}}}, 0x84) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x48000000) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x52b, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}]}, 0x1c}}, 0x0) [ 519.273026] netlink: 'syz-executor2': attribute type 4 has an invalid length. 03:33:40 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}}}, &(0x7f0000000040)=0xe8) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, r1) setxattr(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)=@known='system.posix_acl_access\x00', &(0x7f0000000700)='/dev/net/tun\x00', 0xd, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr(0xffffffffffffffff, &(0x7f00000002c0)=@known='com.apple.system.Security\x00', &(0x7f0000000300)='mime_typevmnet0-wlan0(\x00', 0x17, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000100)}) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x5, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={"6c6f0000000001fff300", 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000380)={"62707130000b00000000000000faff00", r5}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x502}) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) fcntl$getownex(r6, 0x10, &(0x7f00000001c0)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000200)=0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000600)={'sit0\x00', {0x2, 0x4e20, @remote}}) setpgid(r7, r8) bind$bt_sco(r6, &(0x7f00000005c0)={0x1f, {0x7436, 0xffffffff, 0x8, 0x4, 0x4, 0x3}}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000000), &(0x7f0000000740)=""/132, 0x84, 0x0) 03:33:40 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000e5bff6)='/dev/dsp#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f00000015c0)) poll(&(0x7f0000004a80)=[{r0}], 0x1, 0x204) 03:33:40 executing program 5: setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @local}}}, 0x84) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x48000000) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x52b, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}]}, 0x1c}}, 0x0) 03:33:40 executing program 2: setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @local}}}, 0x84) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x48000000) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x52b, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}]}, 0x1c}}, 0x0) 03:33:40 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f00000006c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000580)) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000003e40)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000180)) geteuid() renameat2(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000100)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000780)={@mcast2}, &(0x7f00000007c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ec0)={{{@in=@local, @in6=@mcast1}}, {{}, 0x0, @in6}}, &(0x7f0000000fc0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001040)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001080)={@remote}, &(0x7f00000010c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={"6272696467653000000006ce00"}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") [ 519.394711] netlink: 'syz-executor2': attribute type 4 has an invalid length. [ 519.424044] netlink: 'syz-executor5': attribute type 4 has an invalid length. 03:33:41 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:33:41 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x2) write$UHID_INPUT(r0, &(0x7f00000013c0)={0x8, "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", 0xfffffffffffffdd7}, 0xc9) [ 519.667932] input: syz1 as /devices/virtual/input/input14 [ 519.707608] input: syz1 as /devices/virtual/input/input15 03:33:41 executing program 2: keyctl$set_reqkey_keyring(0x2, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003480)={{{@in6=@loopback, @in=@remote}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000003580)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000035c0)) geteuid() syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:41 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 520.062967] input: syz1 as /devices/virtual/input/input16 03:33:41 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000e5bff6)='/dev/dsp#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f00000015c0)) poll(&(0x7f0000004a80)=[{r0}], 0x1, 0x204) 03:33:41 executing program 0: times(&(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001180)) syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000600)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f0000001040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000680)={&(0x7f0000000780)=ANY=[]}}, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000580)) getegid() getgroups(0x0, &(0x7f0000000600)) getgroups(0x0, &(0x7f0000000640)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000f40)) 03:33:41 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 520.286174] input: syz1 as /devices/virtual/input/input17 03:33:42 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}}}, &(0x7f0000000040)=0xe8) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, r1) setxattr(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)=@known='system.posix_acl_access\x00', &(0x7f0000000700)='/dev/net/tun\x00', 0xd, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr(0xffffffffffffffff, &(0x7f00000002c0)=@known='com.apple.system.Security\x00', &(0x7f0000000300)='mime_typevmnet0-wlan0(\x00', 0x17, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000100)}) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x5, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={"6c6f0000000001fff300", 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000380)={"62707130000b00000000000000faff00", r5}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x502}) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) fcntl$getownex(r6, 0x10, &(0x7f00000001c0)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000200)=0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000600)={'sit0\x00', {0x2, 0x4e20, @remote}}) setpgid(r7, r8) bind$bt_sco(r6, &(0x7f00000005c0)={0x1f, {0x7436, 0xffffffff, 0x8, 0x4, 0x4, 0x3}}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000000), &(0x7f0000000740)=""/132, 0x84, 0x0) 03:33:42 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:33:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='ns\x00') getdents(r0, &(0x7f0000000040)=""/64, 0xfe73) getdents(r0, &(0x7f00000001c0)=""/251, 0xfb) 03:33:42 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0xffff}}) [ 520.870693] input: syz1 as /devices/virtual/input/input18 03:33:42 executing program 4: munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) geteuid() dup2(0xffffffffffffffff, 0xffffffffffffff9c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) fstat(0xffffffffffffffff, &(0x7f00000002c0)) keyctl$chown(0x4, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='\x00'}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000008c0)=ANY=[], 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.SMACK64IPOUT\x00') writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) sendto(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000680)=@generic={0x0, "4733045446a33b2c6fe7a400d206fd12d80478b0090c643f2aff755143e36472bfa17c43e352a27b817797324966c4e2d8a6c4f4e9c2597a5d3dc4de73e45605f0d90a99546240ecb50525b1db71f258844a6481ff3caa9846805739692e9fe0bee0170f84b5350059f6e5e892958099c802f082f17ad5192b5f6af06c51"}, 0x80) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}}) fchdir(0xffffffffffffffff) 03:33:42 executing program 5: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x200000f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000a80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000ac0)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002cc0)={{{@in6=@remote, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@remote}}, &(0x7f0000002dc0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003140)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000033c0)={&(0x7f0000000400), 0xc, &(0x7f0000003380)={&(0x7f0000003180)={0xffffff34}, 0x1f4}}, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b21793e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), 0x4) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000540)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'yam0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@loopback, @in=@dev}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'bridge0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), &(0x7f0000000380)=0xf65d5e7a8b26781e) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000075c0)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007600)={{{@in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000007700)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000007bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007c00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c40)={@mcast2}, &(0x7f0000007c80)=0x14) 03:33:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000001b40)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0x4, r1, &(0x7f0000000200)=""/56, 0xa) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, r1) 03:33:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000), 0xc, &(0x7f00008b7ff0)={&(0x7f00003c0fdc)={0x24, 0x0, 0x1, 0x800000001, 0x0, 0x0, {}, [@nested={0x10, 0x2, [@typed={0x6, 0x1, @ipv4=@local={0xac, 0x14, 0xffffffffffffffff}}]}]}, 0x20e}}, 0x0) 03:33:43 executing program 0: times(&(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001180)) syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000600)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f0000001040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000680)={&(0x7f0000000780)=ANY=[]}}, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000580)) getegid() getgroups(0x0, &(0x7f0000000600)) getgroups(0x0, &(0x7f0000000640)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000f40)) 03:33:43 executing program 1: eventfd2(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001580)) msgget$private(0x0, 0x0) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='lo\x00') getgid() getuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0)) getpgid(0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001500)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000001280)=""/131, 0x83) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) getresgid(&(0x7f0000000140), &(0x7f0000001340), &(0x7f0000001380)) msgget(0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000013c0)) sched_getscheduler(0x0) fstat(0xffffffffffffffff, &(0x7f0000000200)) msgrcv(0x0, &(0x7f00000001c0)=ANY=[], 0x0, 0x0, 0x0) 03:33:43 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x1}, 0x9a) 03:33:43 executing program 5: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x3fd) sendmsg$key(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[]}}, 0x14) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000300)={{0x3a, @empty, 0x4e20, 0x0, 'sed\x00', 0x2a, 0xffffffffffffff80, 0x72}, {@remote, 0x0, 0x2, 0x8, 0xe0dd}}, 0x44) unshare(0x40000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000001c0)=""/153) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clock_gettime(0x0, &(0x7f0000000080)) getpgid(0xffffffffffffffff) write$P9_RGETLOCK(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="0d006367726f75702e70726f63730001ef5e82f9cca382f9cdc215e569348a37894869ebeb3d22196cc35517b56ea06c731ab3df0ec09859aea9c6d5ba9b3eebf9415610a8f523ec73ca491311db644b776f493b3609cb94edd7723f71ccd9d7bb9b1ca3d4ed4c9c23ab405d015c871b5dbcf86ab40c1ec5bb"], 0x79) openat$cgroup_procs(r5, &(0x7f0000000400)='cgroup.threads\x00', 0x2, 0x0) dup2(r1, r4) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) [ 522.237306] IPVS: ftp: loaded support on port[0] = 21 03:33:43 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}}}, &(0x7f0000000040)=0xe8) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, r1) setxattr(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)=@known='system.posix_acl_access\x00', &(0x7f0000000700)='/dev/net/tun\x00', 0xd, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr(0xffffffffffffffff, &(0x7f00000002c0)=@known='com.apple.system.Security\x00', &(0x7f0000000300)='mime_typevmnet0-wlan0(\x00', 0x17, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000100)}) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x5, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={"6c6f0000000001fff300", 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000380)={"62707130000b00000000000000faff00", r5}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x502}) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) fcntl$getownex(r6, 0x10, &(0x7f00000001c0)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000200)=0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000600)={'sit0\x00', {0x2, 0x4e20, @remote}}) setpgid(r7, r8) bind$bt_sco(r6, &(0x7f00000005c0)={0x1f, {0x7436, 0xffffffff, 0x8, 0x4, 0x4, 0x3}}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000000), &(0x7f0000000740)=""/132, 0x84, 0x0) 03:33:43 executing program 4: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@remote, @in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000003c0)) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @local}, @in=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@ipv4={[], [], @broadcast}, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in=@multicast1, @in6=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000dc0)=0xe8) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) 03:33:43 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000b00)=ANY=[], 0x0) unshare(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000002c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) capset(&(0x7f0000000140), &(0x7f0000000180)) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname(0xffffffffffffffff, &(0x7f0000002100)=@hci, &(0x7f0000002180)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000021c0)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000022c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002300)={{{@in6=@dev, @in=@remote}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000002400)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002480)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002540)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000002680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000026c0)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@dev}}, &(0x7f00000027c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002800)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002840)={"76657468305f74005f37ac616d00"}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002880)={@local}, &(0x7f00000028c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@loopback, @in6}}, {{@in=@remote}}}, &(0x7f0000002ac0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002c00)=0x14, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000030c0)={&(0x7f0000002ec0)=@xdp, 0x80, &(0x7f0000003080)}, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000480)=""/254) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000300)={0x47, 0x7d, 0x0, {0x0, 0x40, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, "", 0x4, 'sip\x00', 0x5, 'IPVS\x00', 0x4, 'sip\x00'}}, 0x47) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") [ 522.677382] IPVS: ftp: loaded support on port[0] = 21 03:33:44 executing program 0: prctl$setname(0xd, &(0x7f0000000580)='team0\x00') fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) prctl$setname(0xf, &(0x7f0000000400)='setgroups\x00') accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) geteuid() setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, 0xe8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000180)=0x10) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='setgroups\x00') clock_gettime(0x0, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000480)) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000640), 0x2) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000500)) 03:33:44 executing program 1: rmdir(&(0x7f0000000200)='./file0\x00') getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)) getpgid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}}}, 0x48) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)) semget(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:44 executing program 2: prctl$setname(0x15, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:44 executing program 4: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='vcan0\x00', 0x10) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000140)=@in={0x2, 0x4e20, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x4e20, @local}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f00000004c0)}, 0x0) 03:33:45 executing program 2: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x40) getpid() stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001940), &(0x7f0000001980)=0xe4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000019c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a00), &(0x7f0000001a40)=0xc) lstat(&(0x7f0000001a80)='./file0\x00', &(0x7f0000001ac0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003e80)={{{@in=@local, @in6=@dev}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000003f80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003fc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004040)) stat(&(0x7f0000004080)='./file0\x00', &(0x7f00000040c0)) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)) getuid() fstat(0xffffffffffffffff, &(0x7f0000004180)) getresgid(&(0x7f0000004200), &(0x7f00000001c0), &(0x7f0000004280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900770f78993d233d23410fee9dafaf2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4814960169f7f") 03:33:45 executing program 0: sysinfo(&(0x7f0000000300)=""/130) munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) eventfd2(0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @multicast1}}}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000002c0), 0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:45 executing program 1: pipe(&(0x7f0000000140)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getgroups(0x0, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) dup(0xffffffffffffffff) getpgid(0xffffffffffffffff) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000004640)='/dev/null\x00', 0x0, 0x0) ustat(0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={@dev}, &(0x7f0000000240)=0x14) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@local, @broadcast, @multicast2}, &(0x7f0000000180)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@mcast1}, &(0x7f00000000c0)=0x14) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000940)) getgroups(0x0, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000000f00)=0xe8) stat(&(0x7f0000000f40)='./file1\x00', &(0x7f0000000f80)) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002340)={{{@in=@dev, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000002440)=0xe8) lstat(&(0x7f0000004a40)='./file0\x00', &(0x7f0000004980)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002540)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000002640)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002680), &(0x7f00000026c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002700)={{{@in, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002800)=0xe8) stat(&(0x7f0000002840)='./file0\x00', &(0x7f0000002880)) getresuid(&(0x7f0000002900), &(0x7f0000002940), &(0x7f0000002980)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:45 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}}}, &(0x7f0000000040)=0xe8) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, r1) setxattr(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)=@known='system.posix_acl_access\x00', &(0x7f0000000700)='/dev/net/tun\x00', 0xd, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr(0xffffffffffffffff, &(0x7f00000002c0)=@known='com.apple.system.Security\x00', &(0x7f0000000300)='mime_typevmnet0-wlan0(\x00', 0x17, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000100)}) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x5, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={"6c6f0000000001fff300", 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000380)={"62707130000b00000000000000faff00", r5}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x502}) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) fcntl$getownex(r6, 0x10, &(0x7f00000001c0)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000200)=0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000600)={'sit0\x00', {0x2, 0x4e20, @remote}}) setpgid(r7, r8) bind$bt_sco(r6, &(0x7f00000005c0)={0x1f, {0x7436, 0xffffffff, 0x8, 0x4, 0x4, 0x3}}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000000), &(0x7f0000000740)=""/132, 0x84, 0x0) 03:33:47 executing program 5: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x3fd) sendmsg$key(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[]}}, 0x14) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000300)={{0x3a, @empty, 0x4e20, 0x0, 'sed\x00', 0x2a, 0xffffffffffffff80, 0x72}, {@remote, 0x0, 0x2, 0x8, 0xe0dd}}, 0x44) unshare(0x40000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000001c0)=""/153) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clock_gettime(0x0, &(0x7f0000000080)) getpgid(0xffffffffffffffff) write$P9_RGETLOCK(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="0d006367726f75702e70726f63730001ef5e82f9cca382f9cdc215e569348a37894869ebeb3d22196cc35517b56ea06c731ab3df0ec09859aea9c6d5ba9b3eebf9415610a8f523ec73ca491311db644b776f493b3609cb94edd7723f71ccd9d7bb9b1ca3d4ed4c9c23ab405d015c871b5dbcf86ab40c1ec5bb"], 0x79) openat$cgroup_procs(r5, &(0x7f0000000400)='cgroup.threads\x00', 0x2, 0x0) dup2(r1, r4) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 03:33:47 executing program 1: capset(&(0x7f0000000280)={0x19980330}, &(0x7f0000001fe8)={0x20000fffffffc, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) 03:33:47 executing program 4: getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') creat(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[]}}, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600), 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f00000006c0)) getresuid(&(0x7f00000004c0), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@mcast1, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@remote, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000a00)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@broadcast, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000c80)=0xe8) getuid() ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getgroups(0x0, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000e80)="42805da08a24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028732742d85d096b2179660f38302fbae5e5e5756547ff17c4410d64ac1ec25d31abb7b79873bb7f") 03:33:47 executing program 3: io_setup(0x6, &(0x7f0000000400)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0206969ef69dc00d9ce41ff0f1837370f38211ac414c19086d9f28fc9410feefa4e3a1a9bfbc4c15d549c7e000001004175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000340)={{0xa, 0x0, 0x0, @mcast1}}, 0x5c) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback, @mcast2, @mcast1}) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:33:47 executing program 2: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f70726f632f73656c662f6e65742f70666b65795d663c1f00", 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) rename(&(0x7f0000002180)='./file0\x00', &(0x7f00000029c0)='./file0\x00') syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) openat$dsp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dsp\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$pppoe(0x18, 0x1, 0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @reserved}, 0x10, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000d40)=""/253) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:33:47 executing program 0: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) [ 525.929413] IPVS: ftp: loaded support on port[0] = 21 03:33:47 executing program 1: capset(&(0x7f0000000280)={0x19980330}, &(0x7f0000001fe8)={0x20000fffffffc, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) 03:33:47 executing program 5: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x3fd) sendmsg$key(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[]}}, 0x14) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000300)={{0x3a, @empty, 0x4e20, 0x0, 'sed\x00', 0x2a, 0xffffffffffffff80, 0x72}, {@remote, 0x0, 0x2, 0x8, 0xe0dd}}, 0x44) unshare(0x40000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000001c0)=""/153) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clock_gettime(0x0, &(0x7f0000000080)) getpgid(0xffffffffffffffff) write$P9_RGETLOCK(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="0d006367726f75702e70726f63730001ef5e82f9cca382f9cdc215e569348a37894869ebeb3d22196cc35517b56ea06c731ab3df0ec09859aea9c6d5ba9b3eebf9415610a8f523ec73ca491311db644b776f493b3609cb94edd7723f71ccd9d7bb9b1ca3d4ed4c9c23ab405d015c871b5dbcf86ab40c1ec5bb"], 0x79) openat$cgroup_procs(r5, &(0x7f0000000400)='cgroup.threads\x00', 0x2, 0x0) dup2(r1, r4) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 03:33:47 executing program 3: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x3fd) sendmsg$key(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[]}}, 0x14) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000300)={{0x3a, @empty, 0x4e20, 0x0, 'sed\x00', 0x2a, 0xffffffffffffff80, 0x72}, {@remote, 0x0, 0x2, 0x8, 0xe0dd}}, 0x44) unshare(0x40000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000001c0)=""/153) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clock_gettime(0x0, &(0x7f0000000080)) getpgid(0xffffffffffffffff) write$P9_RGETLOCK(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="0d006367726f75702e70726f63730001ef5e82f9cca382f9cdc215e569348a37894869ebeb3d22196cc35517b56ea06c731ab3df0ec09859aea9c6d5ba9b3eebf9415610a8f523ec73ca491311db644b776f493b3609cb94edd7723f71ccd9d7bb9b1ca3d4ed4c9c23ab405d015c871b5dbcf86ab40c1ec5bb"], 0x79) openat$cgroup_procs(r5, &(0x7f0000000400)='cgroup.threads\x00', 0x2, 0x0) dup2(r1, r4) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) [ 526.474532] IPVS: ftp: loaded support on port[0] = 21 [ 526.478897] IPVS: ftp: loaded support on port[0] = 21 03:33:48 executing program 1: capset(&(0x7f0000000280)={0x19980330}, &(0x7f0000001fe8)={0x20000fffffffc, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) 03:33:48 executing program 3: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x3fd) sendmsg$key(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[]}}, 0x14) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000300)={{0x3a, @empty, 0x4e20, 0x0, 'sed\x00', 0x2a, 0xffffffffffffff80, 0x72}, {@remote, 0x0, 0x2, 0x8, 0xe0dd}}, 0x44) unshare(0x40000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000001c0)=""/153) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clock_gettime(0x0, &(0x7f0000000080)) getpgid(0xffffffffffffffff) write$P9_RGETLOCK(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="0d006367726f75702e70726f63730001ef5e82f9cca382f9cdc215e569348a37894869ebeb3d22196cc35517b56ea06c731ab3df0ec09859aea9c6d5ba9b3eebf9415610a8f523ec73ca491311db644b776f493b3609cb94edd7723f71ccd9d7bb9b1ca3d4ed4c9c23ab405d015c871b5dbcf86ab40c1ec5bb"], 0x79) openat$cgroup_procs(r5, &(0x7f0000000400)='cgroup.threads\x00', 0x2, 0x0) dup2(r1, r4) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 03:33:48 executing program 2: keyctl$dh_compute(0x12, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000002f00)=""/4096, &(0x7f0000000600)=0x1321) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") [ 527.198044] IPVS: ftp: loaded support on port[0] = 21 03:33:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000200)) 03:33:48 executing program 1: capset(&(0x7f0000000280)={0x19980330}, &(0x7f0000001fe8)={0x20000fffffffc, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) 03:33:48 executing program 5: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x3fd) sendmsg$key(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[]}}, 0x14) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000300)={{0x3a, @empty, 0x4e20, 0x0, 'sed\x00', 0x2a, 0xffffffffffffff80, 0x72}, {@remote, 0x0, 0x2, 0x8, 0xe0dd}}, 0x44) unshare(0x40000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000001c0)=""/153) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clock_gettime(0x0, &(0x7f0000000080)) getpgid(0xffffffffffffffff) write$P9_RGETLOCK(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="0d006367726f75702e70726f63730001ef5e82f9cca382f9cdc215e569348a37894869ebeb3d22196cc35517b56ea06c731ab3df0ec09859aea9c6d5ba9b3eebf9415610a8f523ec73ca491311db644b776f493b3609cb94edd7723f71ccd9d7bb9b1ca3d4ed4c9c23ab405d015c871b5dbcf86ab40c1ec5bb"], 0x79) openat$cgroup_procs(r5, &(0x7f0000000400)='cgroup.threads\x00', 0x2, 0x0) dup2(r1, r4) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 03:33:48 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0xa00, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='\x00'}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000780)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socket$unix(0x1, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40)=""/4096, &(0x7f00000002c0)=0x1000) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)}) [ 527.505930] IPVS: ftp: loaded support on port[0] = 21 03:33:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff03c}, {0x6}]}, 0x10) 03:33:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000580)=@newlink={0x20, 0x10, 0xc01}, 0x20}}, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/98, 0x62}, {&(0x7f0000000140)=""/58, 0x3a}, {&(0x7f0000000180)=""/62, 0x3e}], 0x4, &(0x7f0000000200)=""/30, 0x1e}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@getqdisc={0x24, 0x26, 0x201}, 0x24}}, 0x0) 03:33:49 executing program 3: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x3fd) sendmsg$key(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[]}}, 0x14) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000300)={{0x3a, @empty, 0x4e20, 0x0, 'sed\x00', 0x2a, 0xffffffffffffff80, 0x72}, {@remote, 0x0, 0x2, 0x8, 0xe0dd}}, 0x44) unshare(0x40000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000001c0)=""/153) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clock_gettime(0x0, &(0x7f0000000080)) getpgid(0xffffffffffffffff) write$P9_RGETLOCK(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="0d006367726f75702e70726f63730001ef5e82f9cca382f9cdc215e569348a37894869ebeb3d22196cc35517b56ea06c731ab3df0ec09859aea9c6d5ba9b3eebf9415610a8f523ec73ca491311db644b776f493b3609cb94edd7723f71ccd9d7bb9b1ca3d4ed4c9c23ab405d015c871b5dbcf86ab40c1ec5bb"], 0x79) openat$cgroup_procs(r5, &(0x7f0000000400)='cgroup.threads\x00', 0x2, 0x0) dup2(r1, r4) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 03:33:49 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000780)=0xe8) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgroups(0x0, &(0x7f0000000800)) getgid() setxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000600)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1c) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(0xffffffffffffffff, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x2e) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vga_arbiter\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000006c0)}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000740)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev}}}, 0x30) socket$pptp(0x18, 0x1, 0x2) ppoll(&(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000500), 0x8) syz_open_dev$usb(&(0x7f0000000580)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0x80045500, &(0x7f00000005c0)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000840)=""/66, &(0x7f00000008c0)=0x42) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:49 executing program 4: prctl$intptr(0x17, 0x0) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 528.008861] IPVS: ftp: loaded support on port[0] = 21 03:33:49 executing program 0: futex(&(0x7f0000000040), 0x7, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) pselect6(0x40, &(0x7f0000000300)={0x0, 0x0, 0x5, 0x1ff, 0x4, 0x8, 0x0, 0xffffffffffff780b}, &(0x7f0000000340)={0x4, 0x1, 0x0, 0x0, 0x7f, 0x9, 0x8152}, &(0x7f0000000380)={0x9, 0x0, 0x81, 0x6, 0x1, 0x400, 0x3f, 0x1f}, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000440)={&(0x7f0000000400)={0x3}, 0x8}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, "636c69656e000000000000040002000000000000000000000000000000000000000000000800", 0xffffffff90000004, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) write$sndseq(r0, &(0x7f0000042f70)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {0x6}, {}, @addr}], 0xffffffbd) userfaultfd(0x80000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x2000, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0)='nodev^cgroup\x00', 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$clear(0x7, r3) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000100), 0x8) 03:33:49 executing program 2: futex(&(0x7f0000000040), 0x7, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=@random={'trusted.', '\\[,em0}[keyringwlan1em0\x00'}, &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) gettid() pkey_alloc(0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000180)={0x0, 'rose0\x00'}, 0x18) fstat(0xffffffffffffffff, &(0x7f0000000880)) getgroups(0x0, &(0x7f0000000940)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) stat(&(0x7f0000000a40)='./file0/file0\x00', &(0x7f0000000a80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in, @in=@dev}}, {{@in=@loopback}}}, &(0x7f0000000c00)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in=@multicast1, @in6=@ipv4}}, {{}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) lstat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getuid() getgid() getuid() lstat(&(0x7f0000006800)='./file1\x00', &(0x7f0000006840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000068c0), &(0x7f0000006900)=0xc) stat(&(0x7f0000006940)='./file0\x00', &(0x7f0000006980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000007280)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000072c0), &(0x7f0000007300)=0xc) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007340), &(0x7f0000007380)=0xc) getegid() getresuid(&(0x7f00000073c0), &(0x7f0000007400), &(0x7f0000007440)) getresgid(&(0x7f0000007480), &(0x7f00000074c0), &(0x7f0000007500)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007540)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007580)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000007680)=0xe8) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000076c0)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f00000077c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007800), &(0x7f0000007840)=0xc) getresuid(&(0x7f0000007c40), &(0x7f0000007c80), &(0x7f0000007cc0)) getgroups(0x0, &(0x7f0000007d00)) stat(&(0x7f0000007d40)='./file0\x00', &(0x7f0000007d80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007e00), &(0x7f0000007e40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008080)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000008180)=0xe8) lstat(&(0x7f00000081c0)='./file0\x00', &(0x7f0000008200)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:49 executing program 3: r0 = socket(0xa, 0x5, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'veth0_to_bridge\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@loopback, @empty, @loopback, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, r2}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={@loopback, @loopback, @remote, 0x0, 0x0, 0x9}) 03:33:50 executing program 3: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000180), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x402c542b, &(0x7f0000000100)) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) getegid() setgroups(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:50 executing program 1: keyctl$set_reqkey_keyring(0x5, 0xfffffffd) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x78) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in6}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) 03:33:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in=@multicast2, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xe8) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@remote, @in=@multicast2}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000440)=0xe8) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000880)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@broadcast, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f00000009c0)=0xe8) getgroups(0x0, &(0x7f0000000a00)) getpid() stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getgroups(0x0, &(0x7f0000000b00)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in6=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000c40)=0xe8) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in6, @in6=@local}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000e40)=0xe8) getgroups(0x0, &(0x7f0000000e80)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000340), 0x0, &(0x7f0000000ec0)}, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) dup(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0) prctl$void(0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000015c0), 0x0, 0x0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 03:33:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) pselect6(0x40, &(0x7f0000000300)={0x0, 0x0, 0x5, 0x1ff, 0x4, 0x8, 0x0, 0xffffffffffff780b}, &(0x7f0000000340)={0x4, 0x1, 0x0, 0x0, 0x7f, 0x9, 0x8152}, &(0x7f0000000380)={0x9, 0x0, 0x81, 0x6, 0x1, 0x400, 0x3f, 0x1f}, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000440)={&(0x7f0000000400)={0x3}, 0x8}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, "636c69656e000000000000040002000000000000000000000000000000000000000000000800", 0xffffffff90000004, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) write$sndseq(r0, &(0x7f0000042f70)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {0x6}, {}, @addr}], 0xffffffbd) userfaultfd(0x80000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x2000, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0)='nodev^cgroup\x00', 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$clear(0x7, r3) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000100), 0x8) 03:33:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) pselect6(0x40, &(0x7f0000000300)={0x0, 0x0, 0x5, 0x1ff, 0x4, 0x8, 0x0, 0xffffffffffff780b}, &(0x7f0000000340)={0x4, 0x1, 0x0, 0x0, 0x7f, 0x9, 0x8152}, &(0x7f0000000380)={0x9, 0x0, 0x81, 0x6, 0x1, 0x400, 0x3f, 0x1f}, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000440)={&(0x7f0000000400)={0x3}, 0x8}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, "636c69656e000000000000040002000000000000000000000000000000000000000000000800", 0xffffffff90000004, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) write$sndseq(r0, &(0x7f0000042f70)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {0x6}, {}, @addr}], 0xffffffbd) userfaultfd(0x80000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x2000, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0)='nodev^cgroup\x00', 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$clear(0x7, r3) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000100), 0x8) 03:33:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) pselect6(0x40, &(0x7f0000000300)={0x0, 0x0, 0x5, 0x1ff, 0x4, 0x8, 0x0, 0xffffffffffff780b}, &(0x7f0000000340)={0x4, 0x1, 0x0, 0x0, 0x7f, 0x9, 0x8152}, &(0x7f0000000380)={0x9, 0x0, 0x81, 0x6, 0x1, 0x400, 0x3f, 0x1f}, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000440)={&(0x7f0000000400)={0x3}, 0x8}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, "636c69656e000000000000040002000000000000000000000000000000000000000000000800", 0xffffffff90000004, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) write$sndseq(r0, &(0x7f0000042f70)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {0x6}, {}, @addr}], 0xffffffbd) userfaultfd(0x80000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x2000, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0)='nodev^cgroup\x00', 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$clear(0x7, r3) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000100), 0x8) 03:33:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) pselect6(0x40, &(0x7f0000000300)={0x0, 0x0, 0x5, 0x1ff, 0x4, 0x8, 0x0, 0xffffffffffff780b}, &(0x7f0000000340)={0x4, 0x1, 0x0, 0x0, 0x7f, 0x9, 0x8152}, &(0x7f0000000380)={0x9, 0x0, 0x81, 0x6, 0x1, 0x400, 0x3f, 0x1f}, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000440)={&(0x7f0000000400)={0x3}, 0x8}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, "636c69656e000000000000040002000000000000000000000000000000000000000000000800", 0xffffffff90000004, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) write$sndseq(r0, &(0x7f0000042f70)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {0x6}, {}, @addr}], 0xffffffbd) userfaultfd(0x80000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x2000, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0)='nodev^cgroup\x00', 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$clear(0x7, r3) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000100), 0x8) 03:33:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) pselect6(0x40, &(0x7f0000000300)={0x0, 0x0, 0x5, 0x1ff, 0x4, 0x8, 0x0, 0xffffffffffff780b}, &(0x7f0000000340)={0x4, 0x1, 0x0, 0x0, 0x7f, 0x9, 0x8152}, &(0x7f0000000380)={0x9, 0x0, 0x81, 0x6, 0x1, 0x400, 0x3f, 0x1f}, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000440)={&(0x7f0000000400)={0x3}, 0x8}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, "636c69656e000000000000040002000000000000000000000000000000000000000000000800", 0xffffffff90000004, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) write$sndseq(r0, &(0x7f0000042f70)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {0x6}, {}, @addr}], 0xffffffbd) userfaultfd(0x80000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x2000, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0)='nodev^cgroup\x00', 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$clear(0x7, r3) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000100), 0x8) 03:33:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) pselect6(0x40, &(0x7f0000000300)={0x0, 0x0, 0x5, 0x1ff, 0x4, 0x8, 0x0, 0xffffffffffff780b}, &(0x7f0000000340)={0x4, 0x1, 0x0, 0x0, 0x7f, 0x9, 0x8152}, &(0x7f0000000380)={0x9, 0x0, 0x81, 0x6, 0x1, 0x400, 0x3f, 0x1f}, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000440)={&(0x7f0000000400)={0x3}, 0x8}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, "636c69656e000000000000040002000000000000000000000000000000000000000000000800", 0xffffffff90000004, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) write$sndseq(r0, &(0x7f0000042f70)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {0x6}, {}, @addr}], 0xffffffbd) userfaultfd(0x80000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x2000, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0)='nodev^cgroup\x00', 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$clear(0x7, r3) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000100), 0x8) 03:33:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) pselect6(0x40, &(0x7f0000000300)={0x0, 0x0, 0x5, 0x1ff, 0x4, 0x8, 0x0, 0xffffffffffff780b}, &(0x7f0000000340)={0x4, 0x1, 0x0, 0x0, 0x7f, 0x9, 0x8152}, &(0x7f0000000380)={0x9, 0x0, 0x81, 0x6, 0x1, 0x400, 0x3f, 0x1f}, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000440)={&(0x7f0000000400)={0x3}, 0x8}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, "636c69656e000000000000040002000000000000000000000000000000000000000000000800", 0xffffffff90000004, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) write$sndseq(r0, &(0x7f0000042f70)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {0x6}, {}, @addr}], 0xffffffbd) userfaultfd(0x80000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x2000, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0)='nodev^cgroup\x00', 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$clear(0x7, r3) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000100), 0x8) 03:33:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ab553fec94242032ff07000000000000", 0x10) sendto(r0, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000180)=@ax25={0x3, {"079e51c4585213"}}, 0x80) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000005a80)=[{{&(0x7f0000000040)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/126, 0x7e}], 0x61, &(0x7f0000000740)=""/231, 0xe7}}, {{&(0x7f0000000fc0)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000001040)=""/79, 0x2000108f}, {&(0x7f0000001100)=""/253, 0xfd}], 0x2, &(0x7f00000033c0)=""/4096, 0x118f}}], 0x2, 0x0, 0x0) 03:33:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) pselect6(0x40, &(0x7f0000000300)={0x0, 0x0, 0x5, 0x1ff, 0x4, 0x8, 0x0, 0xffffffffffff780b}, &(0x7f0000000340)={0x4, 0x1, 0x0, 0x0, 0x7f, 0x9, 0x8152}, &(0x7f0000000380)={0x9, 0x0, 0x81, 0x6, 0x1, 0x400, 0x3f, 0x1f}, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000440)={&(0x7f0000000400)={0x3}, 0x8}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, "636c69656e000000000000040002000000000000000000000000000000000000000000000800", 0xffffffff90000004, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) write$sndseq(r0, &(0x7f0000042f70)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {0x6}, {}, @addr}], 0xffffffbd) userfaultfd(0x80000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x2000, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0)='nodev^cgroup\x00', 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$clear(0x7, r3) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000100), 0x8) 03:33:51 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpgid(0x0) sched_setscheduler(r0, 0x40000005, &(0x7f00000003c0)) futex(&(0x7f0000000180), 0x9, 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) 03:33:51 executing program 1: memfd_create(&(0x7f0000000380)='asymmetric\x00', 0x0) syncfs(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000500)=0x24) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'U-', 0x7}, 0x28, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000540)={@empty, @link_local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @loopback, @link_local, @mcast2}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001800), &(0x7f0000001840)=0xc) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900)) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001dc0)) fstat(0xffffffffffffffff, &(0x7f0000001e00)) getgid() getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002200), &(0x7f0000002240)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002280), &(0x7f00000022c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002300)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000002400)=0xe8) getegid() getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002440)={{{@in6=@dev, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000002540)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002180)) getresuid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0)) lstat(&(0x7f0000002700)='./file0\x00', &(0x7f0000002740)) getpid() geteuid() stat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) stat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002d80)) fstat(0xffffffffffffffff, &(0x7f0000002dc0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000032c0)='\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003340)={{{@in=@remote, @in6=@remote}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000003440)=0xe8) getgroups(0x0, &(0x7f0000003480)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000034c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f0000005a80)='./file0\x00', &(0x7f0000005ac0)) fstat(0xffffffffffffffff, &(0x7f0000005b40)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:51 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge_slave_0\x00'}, 0x18) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000002c0), 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x0, 0x0) gettid() process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000121000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f00000004c0)=ANY=[]) socketpair(0x0, 0x0, 0x0, &(0x7f0000000480)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000380), 0x0) gettid() syz_open_procfs(0x0, &(0x7f0000000680)='attr/fscreate\x00') syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 03:33:51 executing program 5: keyctl$set_reqkey_keyring(0xe, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0xc) stat(&(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000900)=0xe8) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) lstat(&(0x7f0000000a00)='./file1\x00', &(0x7f0000000a40)) getresgid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) setxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f0000000b80), 0x24, 0x0) add_key(&(0x7f0000001940)='id_legacy\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffe) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) execve(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340), &(0x7f0000000400)) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000140), 0x4) chmod(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f0000000440)=0xffffffffffffff76) getpgid(0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700), 0x0, 0x0) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380), &(0x7f0000000040), 0x0, 0xfffffffffffffffe) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/llc\x00') write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) creat(&(0x7f00000004c0)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000540), 0x40001ce, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f00000003c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000040)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:51 executing program 4: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000004c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000ac0)={@local}, &(0x7f0000000b00)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000b40)={'vcan0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e40)={0x0, @multicast1, @dev}, &(0x7f0000000e80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002c40)={0x0, @broadcast}, &(0x7f0000002c80)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002d00)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000002d40), &(0x7f0000002d80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000041c0)={@loopback}, &(0x7f0000004200)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000004280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004300)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004340)={{{@in6=@ipv4={[], [], @local}, @in6}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000004440)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000004880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000048c0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000aa40), 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ab80)={{{@in6, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f000000ac80)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000001bb00), 0x0, 0x0, &(0x7f000001bd40)={0x77359400}) getpeername(0xffffffffffffffff, &(0x7f000001bd80)=@can, &(0x7f000001be00)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000001be40)={@dev, @dev}, &(0x7f000001be80)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f000001e780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000001e7c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000001e800)={@mcast1}, &(0x7f000001e840)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000001e880)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @broadcast}, &(0x7f0000000bc0)=0xfffffe1d) accept$packet(0xffffffffffffff9c, &(0x7f000001ee00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000001ee40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000001ee80)={{{@in, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f000001ef80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000001efc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000001f280)={0x0, @multicast2, @remote}, &(0x7f000001f2c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000001f540)={{{@in=@multicast2, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f000001f640)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f000001f740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000001f780)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f000001f9c0), &(0x7f000001fa00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000001fb00)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000001fc00)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000001fd00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000020080)={{{@in6, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000020180)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000020280)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000020380)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000020e40)={&(0x7f00000002c0), 0xc, &(0x7f0000020e00)={&(0x7f00000203c0)={0x14}, 0x14}}, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) pselect6(0x40, &(0x7f0000000300)={0x0, 0x0, 0x5, 0x1ff, 0x4, 0x8, 0x0, 0xffffffffffff780b}, &(0x7f0000000340)={0x4, 0x1, 0x0, 0x0, 0x7f, 0x9, 0x8152}, &(0x7f0000000380)={0x9, 0x0, 0x81, 0x6, 0x1, 0x400, 0x3f, 0x1f}, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000440)={&(0x7f0000000400)={0x3}, 0x8}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, "636c69656e000000000000040002000000000000000000000000000000000000000000000800", 0xffffffff90000004, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) write$sndseq(r0, &(0x7f0000042f70)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {0x6}, {}, @addr}], 0xffffffbd) userfaultfd(0x80000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x2000, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0)='nodev^cgroup\x00', 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$clear(0x7, r3) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000100), 0x8) 03:33:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ab553fec94242032ff07000000000000", 0x10) sendto(r0, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000180)=@ax25={0x3, {"079e51c4585213"}}, 0x80) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000005a80)=[{{&(0x7f0000000040)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/126, 0x7e}], 0x61, &(0x7f0000000740)=""/231, 0xe7}}, {{&(0x7f0000000fc0)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000001040)=""/79, 0x2000108f}, {&(0x7f0000001100)=""/253, 0xfd}], 0x2, &(0x7f00000033c0)=""/4096, 0x118f}}], 0x2, 0x0, 0x0) 03:33:52 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="140000000000000029002bed85700183456843bb2ce9ef6705000000000000000000000000000000"], 0x28}}], 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 03:33:52 executing program 0: clock_gettime(0xb, &(0x7f0000000040)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:52 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/loop-control\x00', 0x101002, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000580)=""/137}, 0x18) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/65, &(0x7f00000001c0)=0x41) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @multicast1}}}, &(0x7f0000000080)=0x100) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000340)=@assoc_value, 0x8) setrlimit(0x0, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0), 0x8) clock_gettime(0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x13, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x7]}, 0x2c) 03:33:52 executing program 5: getrusage(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='eth1\x00', 0xffffffffffffff9c}, 0x10) eventfd2(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001580)) msgget$private(0x0, 0x0) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) getgid() getuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:52 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x84, @loopback, 0x0, 0x1, "6c626c63720500"}, 0x2c) 03:33:52 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f00000001c0), 0x8) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@dev, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f00000008c0)=0xe8) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getegid() getgid() lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getresgid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80)) lsetxattr$system_posix_acl(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='system.posix_acl_default\x00', &(0x7f0000000cc0), 0x24, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) getpid() ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) syz_open_procfs(0x0, &(0x7f00000003c0)='net/sockstat6\x00') setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000440)='y\x00', 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000200)="776c616e31933a266b657972696e67706f7369785f61636c5f6163636573732e2f5b7365637572697479243a255be39e7573657200"}, 0x10) [ 531.335234] IPVS: Scheduler module ip_vs_lblcr not found 03:33:52 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x4, 0x0, {0x0, 0x0, 0x0, 0x1e, 0xb, 0x81}}) [ 531.489598] rtc_cmos 00:00: Alarms can be up to one day in the future 03:33:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ab553fec94242032ff07000000000000", 0x10) sendto(r0, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000180)=@ax25={0x3, {"079e51c4585213"}}, 0x80) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000005a80)=[{{&(0x7f0000000040)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/126, 0x7e}], 0x61, &(0x7f0000000740)=""/231, 0xe7}}, {{&(0x7f0000000fc0)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000001040)=""/79, 0x2000108f}, {&(0x7f0000001100)=""/253, 0xfd}], 0x2, &(0x7f00000033c0)=""/4096, 0x118f}}], 0x2, 0x0, 0x0) 03:33:53 executing program 3: clock_gettime(0x2, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:53 executing program 0: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) getpid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) getgid() getgid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) prctl$intptr(0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f00000007c0), &(0x7f0000000980)) 03:33:53 executing program 1: syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x0, 0xffe0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./bus\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) lstat(&(0x7f00000030c0)='./bus\x00', &(0x7f0000003100)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000031c0)={{{@in6=@dev, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000003380)='./bus\x00', &(0x7f00000033c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003500)) stat(&(0x7f0000003540)='./bus\x00', &(0x7f0000003580)) getresgid(&(0x7f0000003600), &(0x7f0000003640), &(0x7f0000003680)) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000004fc0)='./bus\x00', &(0x7f0000005000)) getresgid(&(0x7f0000005080), &(0x7f00000050c0), &(0x7f0000005100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005140), &(0x7f0000005180)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000051c0), &(0x7f0000005200)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:53 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000700)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x10, 0x11, 0x0, @dev, @local, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}}}}}}}, &(0x7f0000001780)={0x1, 0x1, [0x5]}) 03:33:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000002ff0), 0x10) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000005ff0)={&(0x7f0000008000)={0x5, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4}, @sadb_lifetime={0x4, 0x0, 0x4}, @sadb_x_nat_t_port={0x1}]}, 0x58}}, 0x0) 03:33:53 executing program 5: keyctl$set_reqkey_keyring(0x7, 0xfffffffc) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) getgroups(0x0, &(0x7f0000000400)) keyctl$chown(0x4, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) 03:33:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ab553fec94242032ff07000000000000", 0x10) sendto(r0, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000180)=@ax25={0x3, {"079e51c4585213"}}, 0x80) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000005a80)=[{{&(0x7f0000000040)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/126, 0x7e}], 0x61, &(0x7f0000000740)=""/231, 0xe7}}, {{&(0x7f0000000fc0)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000001040)=""/79, 0x2000108f}, {&(0x7f0000001100)=""/253, 0xfd}], 0x2, &(0x7f00000033c0)=""/4096, 0x118f}}], 0x2, 0x0, 0x0) 03:33:54 executing program 3: prctl$setname(0x23, &(0x7f00000000c0)='/dev/full\x00') socket$kcm(0x29, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000240)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f00000002c0)=0x80, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000480), &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000300), &(0x7f00000003c0)=0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) stat(&(0x7f0000002cc0)='./file0\x00', &(0x7f0000002d00)) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d80), &(0x7f0000002dc0)=0x2b) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000002f00)=0xe8) stat(&(0x7f0000002f40)='./file0\x00', &(0x7f0000002f80)) gettid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003000), &(0x7f0000003040)=0xc) getpid() fstat(0xffffffffffffffff, &(0x7f0000003080)) lstat(&(0x7f0000003100)='./file0\x00', &(0x7f0000003140)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000031c0)={{{@in=@loopback, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000032c0)=0xe8) getresgid(&(0x7f0000003300), &(0x7f0000003340), &(0x7f0000003380)) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000033c0)) getgid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003580)={&(0x7f0000000900)=@abs, 0x6e, &(0x7f0000002b80), 0x0, &(0x7f00000035c0)=ANY=[]}, 0x0) syz_open_dev$dspn(&(0x7f0000000600)='/dev/dsp#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000640)}}, 0x20) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000006c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "8388df", "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"}}, 0x110) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000400), &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000800), &(0x7f0000000840)=0x14) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000880), &(0x7f00000008c0)=0xb) prctl$setname(0xf, &(0x7f0000000540)='/dev/full\x00') syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:54 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000080), 0x0, 0x400}], 0x0, &(0x7f00000003c0)) 03:33:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) getpgid(0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @multicast1}, &(0x7f0000000140)=0xc) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @multicast1}, 0xc) fchmod(0xffffffffffffffff, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000440)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in6, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000700)=0xe8) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000fc0)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xffffffffffffffc6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000ac0)=0xe8) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) geteuid() stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000d40)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0215151ef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefac403ad5c2e08660f3887302f2fe5e5e575455f0f2e1a1a010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={@dev, @loopback}, 0x8) init_module(&(0x7f0000000340)='self+*+md5sum\x00', 0xe, &(0x7f0000000580)='team\x00') setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000001c0), 0x4) fchmod(0xffffffffffffffff, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000540)) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000400), 0x4) 03:33:54 executing program 1: getresgid(&(0x7f0000000900), &(0x7f0000000a80), &(0x7f0000000ac0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getegid() getgid() stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) fstat(0xffffffffffffff9c, &(0x7f0000000d00)) getgroups(0x0, &(0x7f0000000d80)) syz_extract_tcp_res(&(0x7f0000000740), 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000780), 0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f00000007c0)=ANY=[], &(0x7f0000000940)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/autofs\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e00)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='cgroup.type\x00'}, 0xffffffffffffff32) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) epoll_create1(0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000500)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000380), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x14}, 0x14}}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$fou(&(0x7f0000000640)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000003c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14}, 0x14}}, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @multicast1}}}, 0x108) pipe(&(0x7f00000000c0)) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000540)={@in6={{0xa, 0x0, 0x0, @local}}, 0x0, 0x0, 0x0, "3240393b3524e6f299a5660752ba05dd900be83fa472608f0dcc3b1924d1a947d4af831e9dd168424833be08f83c0a327f6737675d0c8b5b249879625d4030430cfc9881397cc8e19cb8ddb56e17f70d"}, 0xd8) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000880)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=ANY=[]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) getpgrp(0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:54 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f00000001c0), r1, 0x0, 0x9, 0x0) 03:33:55 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, r0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000400)=""/48, 0x30, 0x40000040, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, r1) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="c6a34e987940ea478d9bd365b9e4621e334652733324b7773a3df8a7504d9e18e2e4a839fcd9030000000000000028945d12a9caae603ff81c4dc32ed3d70fb5d4c5b866305249060000005277822d0e0616a2e5b74c48e38b9936f298c6feec95ad327c724ec507bd34b94e99623f014bf81ea54900ac54a99aa04e1a7f000000e8d3bfa2f3abce9736aac3e0b19d5a697bc438cd49bc1cf3af72c2180bbee78e9a7237c02e10ac77e3a4fd8a6e2bdca6a9a1d7da1a3e559fdafb6703c73b3c4c10865302fb324f16327996273625d9f0a54ef16bdb08f22ed11fd80b74eb861aebe51b0912c0f79486c25c49524ffe4f00", 0xf2, r2) request_key(&(0x7f0000000940)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3, 0x29138c2e}, &(0x7f0000000300)="af2019dcc2380b4623dc8c7a581973a96d57452035fca47b18e7992f4c82e608a92c436783ee4e3264245238b946a4a11d39b7873e5f3296185625d49ae13974d13940d0c01a5029b35aec2234860f6525f00000000000000000", 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) 03:33:55 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, r0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000400)=""/48, 0x30, 0x40000040, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, r1) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="c6a34e987940ea478d9bd365b9e4621e334652733324b7773a3df8a7504d9e18e2e4a839fcd9030000000000000028945d12a9caae603ff81c4dc32ed3d70fb5d4c5b866305249060000005277822d0e0616a2e5b74c48e38b9936f298c6feec95ad327c724ec507bd34b94e99623f014bf81ea54900ac54a99aa04e1a7f000000e8d3bfa2f3abce9736aac3e0b19d5a697bc438cd49bc1cf3af72c2180bbee78e9a7237c02e10ac77e3a4fd8a6e2bdca6a9a1d7da1a3e559fdafb6703c73b3c4c10865302fb324f16327996273625d9f0a54ef16bdb08f22ed11fd80b74eb861aebe51b0912c0f79486c25c49524ffe4f00", 0xf2, r2) request_key(&(0x7f0000000940)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3, 0x29138c2e}, &(0x7f0000000300)="af2019dcc2380b4623dc8c7a581973a96d57452035fca47b18e7992f4c82e608a92c436783ee4e3264245238b946a4a11d39b7873e5f3296185625d49ae13974d13940d0c01a5029b35aec2234860f6525f00000000000000000", 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) 03:33:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x1, &(0x7f0000000380), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000020000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000000)="f2a766ba610066ed48b813c4830f000000000f23d00f21f835300000000f23f866ba2000edc441175d392e67450f01cb0fc72cbe67400f001066ba4100b0a8ee36420f015900", 0x46}], 0x1, 0x0, &(0x7f0000000100), 0x0) uselib(&(0x7f0000000380)='./file0\x00') setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000200)={0x6, @broadcast, 0x4e21, 0x0, 'wlc\x00', 0x20}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x49, 0x0, {0x0, 0x0, 0x1}}, 0x14) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/195) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f00000004c0)={"8a01fedfb6ec6ad68e295ceea0e652c2304bd4aaa9590065244c2fa26896b818233960413e5a0c4e62c8ad9d0a6c679771360dae7f329feb38e290e5bafecdc384107c358ba47de9654d24d1250f0233b99097021f1f0ba1d03f5cd12995b14b10e3f199235981e3403392e6293dd1b1b07266a7be8852979f057ff3db20ad3d8332653d5bcb65f3c93aa6b96629f84f502144c29d6ef94e1ebdb093eb1f680cb1e7976bacf93c902a9bf680636d7b9c34b38c0bc3205a2ae0d99daf457fc9f9f756476f66a185729a36866753cef4d6de3d809ca9d1bc73e3f27b6a7f8793d763a6b3578e75bc47955b4d8556572d49ccb5c784e95db1c7bc8d63df2163ee6303897a418260385ce6f16eb9b8f526eee0842e49c86a5b194ec3ac9bdac39b42ff2c6fadbb825a8db411c3299501857818d9f42da0ffefc8aa2f57ea1a03fbf10bb27c0d6977ef2a4ca7644ab06c1f397d78a796f9bb0ce2ef56f167fe9de55c87a74040471c302edac3047c94f405d0da43971af1dcaefa1a19381c1d271c74601f8b7acbad060a3e79579982b8f3049bb63d8e592d4e1a758229a72e5dfed55062ff67348b1532fb1652cccd438f5675910fea5d8276374605a20268f4c3aead9d84bf97a82dc7575222f01a90fd33410a444ca13898bbfc37e8527b81b43ec05dea3ac731fd11f8b4959c83b7b1f214421b0559ce1f358359853a08959919ff3c7e3bc690f8254636c7d6c448888f44524c6479e87834c7814731de17219a2d0e3acce08ee3d3a51655d46c74268bc9f7c4c1bd3d6ff601dfc87de7ec998b28af408a6c9fad4212f609ca703c80718c4a6cbd84cdcb4a4927bb338f6f66a93b7c585e8363919b0c4c44914e515f16a85b52ea994782557b09666d134c0d29093a85d575fe2a11c2c7b7428984be8dab6dcd0bac6a983fedcf5e11974f7b771517ebc932d717b36899544eb63090b865e7651f863f2de57258e77c617f8f9f3a672b3244de65b76bd8eccb403aa5742013444247ea3fcdccd646fe10c8ce8065a748a018062b62f6a2f14f7c74d10560052087a8c17f1ccea84781bcebc362daacadc8ff955f49d17ad9e9a88432cecc8c48415c21bad8ffe3e50d558d4280e58cc2b305ff5a126b4de99bffd2eeffd7adaae49e9c02c7c52181d55bff4b8a317d4f52377a8505514f651ed415356641ef3429e81d6669cf76d52a2e5fa083fb078cef1ebd29b13cb7e17428b55d472d6ac520c9de7de05eb8e71f54e9945f4217090e6cf3d437673e33fb6f99c52503fe6825d564c6d54119b2d2458475ca3f277b36829c95e4e652190f7db689f9f0bcade5843fba06095a0152ec9b8c185fa627ac3bb76d07a877d57b70674f69e3d1811c0ff2d880d1a3f509f35cae0693ac8e0ff04ef57e462470c8b604cd6a37a336a1cd6621a1e420491fac7a4921"}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x2, 0x0, 0xd49}, &(0x7f0000000400)=0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:55 executing program 4: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000000c0)) pipe2(&(0x7f00000004c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) gettid() syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getresuid(&(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f0000000500)=0xe8) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) getuid() getuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000600)) getgid() getgroups(0x0, &(0x7f0000000680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:55 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2, &(0x7f00000001c0)="107d5298871577744016c909580d5d2e5c49a965c622a58fcbd65e9da28ac5a266b98ad96f7d94220c7244d869cd603f06344ea9adcb96f3071998c69e39767e2f7474750230c5b1e1681a0eb48f88ea423628a5b52d758fcc57d18dba3edbdf9cef03de37749863a46b4b74748603e9771854c7b9e367ca65027eb8d28bfdc7d9686ee41c89ede6ac3d6beea64f6d") sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000280)) unshare(0x6c000000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) pipe2(&(0x7f0000000140), 0x0) clock_gettime(0x8000000000, &(0x7f0000000340)) socket$packet(0x11, 0x0, 0x300) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) 03:33:55 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, r0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000400)=""/48, 0x30, 0x40000040, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, r1) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="c6a34e987940ea478d9bd365b9e4621e334652733324b7773a3df8a7504d9e18e2e4a839fcd9030000000000000028945d12a9caae603ff81c4dc32ed3d70fb5d4c5b866305249060000005277822d0e0616a2e5b74c48e38b9936f298c6feec95ad327c724ec507bd34b94e99623f014bf81ea54900ac54a99aa04e1a7f000000e8d3bfa2f3abce9736aac3e0b19d5a697bc438cd49bc1cf3af72c2180bbee78e9a7237c02e10ac77e3a4fd8a6e2bdca6a9a1d7da1a3e559fdafb6703c73b3c4c10865302fb324f16327996273625d9f0a54ef16bdb08f22ed11fd80b74eb861aebe51b0912c0f79486c25c49524ffe4f00", 0xf2, r2) request_key(&(0x7f0000000940)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3, 0x29138c2e}, &(0x7f0000000300)="af2019dcc2380b4623dc8c7a581973a96d57452035fca47b18e7992f4c82e608a92c436783ee4e3264245238b946a4a11d39b7873e5f3296185625d49ae13974d13940d0c01a5029b35aec2234860f6525f00000000000000000", 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) 03:33:55 executing program 3: fanotify_init(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) inotify_init() syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='nodev\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=ANY=[]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) getpgrp(0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:55 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x200000006) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001300)=0xe8) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001700), 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={@loopback}, &(0x7f0000000440)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) getgid() seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") [ 534.467919] IPVS: ftp: loaded support on port[0] = 21 03:33:56 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, r0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000400)=""/48, 0x30, 0x40000040, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, r1) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="c6a34e987940ea478d9bd365b9e4621e334652733324b7773a3df8a7504d9e18e2e4a839fcd9030000000000000028945d12a9caae603ff81c4dc32ed3d70fb5d4c5b866305249060000005277822d0e0616a2e5b74c48e38b9936f298c6feec95ad327c724ec507bd34b94e99623f014bf81ea54900ac54a99aa04e1a7f000000e8d3bfa2f3abce9736aac3e0b19d5a697bc438cd49bc1cf3af72c2180bbee78e9a7237c02e10ac77e3a4fd8a6e2bdca6a9a1d7da1a3e559fdafb6703c73b3c4c10865302fb324f16327996273625d9f0a54ef16bdb08f22ed11fd80b74eb861aebe51b0912c0f79486c25c49524ffe4f00", 0xf2, r2) request_key(&(0x7f0000000940)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3, 0x29138c2e}, &(0x7f0000000300)="af2019dcc2380b4623dc8c7a581973a96d57452035fca47b18e7992f4c82e608a92c436783ee4e3264245238b946a4a11d39b7873e5f3296185625d49ae13974d13940d0c01a5029b35aec2234860f6525f00000000000000000", 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) 03:33:56 executing program 4: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) accept4$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x0) accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000600)) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000004c0)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000540)={0x2, 0x0, @dev}, &(0x7f0000000580)=0x10, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000005c0)={'bridge0\x00'}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000500)='net/fib_triestat\x00') epoll_create1(0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000001100)='trusted.overlay.origin\x00', &(0x7f0000000480)='y\x00', 0x2, 0x0) getgroups(0x0, &(0x7f0000000000)) setregid(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)=""/70, 0x46}) preadv(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000780)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000008c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000980)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) getgroups(0x0, &(0x7f0000000dc0)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000ec0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:33:56 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r3 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r3, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r3, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000240)) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) [ 534.884767] IPVS: ftp: loaded support on port[0] = 21 03:33:56 executing program 2: memfd_create(&(0x7f0000000200)='em0user\x00', 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) close(0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") bind(0xffffffffffffffff, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) 03:33:56 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r3 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r3, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r3, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000240)) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:57 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r3 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r3, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r3, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000240)) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=ANY=[]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) getpgrp(0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:58 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2, &(0x7f00000001c0)="107d5298871577744016c909580d5d2e5c49a965c622a58fcbd65e9da28ac5a266b98ad96f7d94220c7244d869cd603f06344ea9adcb96f3071998c69e39767e2f7474750230c5b1e1681a0eb48f88ea423628a5b52d758fcc57d18dba3edbdf9cef03de37749863a46b4b74748603e9771854c7b9e367ca65027eb8d28bfdc7d9686ee41c89ede6ac3d6beea64f6d") sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000280)) unshare(0x6c000000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) pipe2(&(0x7f0000000140), 0x0) clock_gettime(0x8000000000, &(0x7f0000000340)) socket$packet(0x11, 0x0, 0x300) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) 03:33:58 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r3 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r3, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r3, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000240)) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:58 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r3 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r3, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r3, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000240)) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:58 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r3 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r3, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r3, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000240)) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:58 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r3 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r3, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r3, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000240)) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=ANY=[]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) getpgrp(0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) [ 537.594358] IPVS: ftp: loaded support on port[0] = 21 03:33:59 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r3 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r3, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r3, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000240)) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:59 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r3 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r3, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r3, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000240)) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:59 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r3 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r3, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r3, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000240)) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:59 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r3 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r3, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r3, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000240)) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:59 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2, &(0x7f00000001c0)="107d5298871577744016c909580d5d2e5c49a965c622a58fcbd65e9da28ac5a266b98ad96f7d94220c7244d869cd603f06344ea9adcb96f3071998c69e39767e2f7474750230c5b1e1681a0eb48f88ea423628a5b52d758fcc57d18dba3edbdf9cef03de37749863a46b4b74748603e9771854c7b9e367ca65027eb8d28bfdc7d9686ee41c89ede6ac3d6beea64f6d") sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000280)) unshare(0x6c000000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) pipe2(&(0x7f0000000140), 0x0) clock_gettime(0x8000000000, &(0x7f0000000340)) socket$packet(0x11, 0x0, 0x300) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) 03:33:59 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r3 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r3, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r3, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000240)) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:59 executing program 3: keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 538.266495] IPVS: ftp: loaded support on port[0] = 21 03:34:00 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r3 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r3, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r3, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000240)) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:34:00 executing program 2: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:00 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x22, &(0x7f0000000440)=""/154, &(0x7f00000000c0)=0x9a) 03:34:00 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2, &(0x7f00000001c0)="107d5298871577744016c909580d5d2e5c49a965c622a58fcbd65e9da28ac5a266b98ad96f7d94220c7244d869cd603f06344ea9adcb96f3071998c69e39767e2f7474750230c5b1e1681a0eb48f88ea423628a5b52d758fcc57d18dba3edbdf9cef03de37749863a46b4b74748603e9771854c7b9e367ca65027eb8d28bfdc7d9686ee41c89ede6ac3d6beea64f6d") sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000280)) unshare(0x6c000000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) pipe2(&(0x7f0000000140), 0x0) clock_gettime(0x8000000000, &(0x7f0000000340)) socket$packet(0x11, 0x0, 0x300) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) 03:34:00 executing program 4: clock_gettime(0x0, &(0x7f0000000500)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001bc0)) fstat(0xffffffffffffffff, &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getpid() stat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000000a000), &(0x7f0000009fc0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e80)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@rand_addr}}, &(0x7f0000001f80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001fc0)) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgroups(0x0, &(0x7f0000002880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002940)={{{@in6=@mcast1, @in=@multicast2}}, {{}, 0x0, @in6=@local}}, &(0x7f0000002a40)=0xe8) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006f80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006fc0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f00000070c0)=0xe8) getgroups(0x0, &(0x7f0000007100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008280), &(0x7f00000082c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008300), &(0x7f0000008340)=0xc) getgroups(0x0, &(0x7f0000008380)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000083c0)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000084c0)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000009880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000098c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f00000099c0)=0xe8) stat(&(0x7f0000009a00)='./file0\x00', &(0x7f0000009a40)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000009ac0)) getresuid(&(0x7f0000009b00), &(0x7f0000009b40), &(0x7f0000009b80)) stat(&(0x7f0000009bc0)='./file0\x00', &(0x7f0000009c00)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000009d80), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") [ 538.859366] IPVS: ftp: loaded support on port[0] = 21 03:34:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x41a}], 0x1, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000240), 0x8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x2, @in6=@mcast2}}, 0xe8) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:34:00 executing program 3: dup(0xffffffffffffff9c) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @multicast1}}}, 0x108) pipe(&(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000800)={0x0, 0x0, 0x0, @thr={&(0x7f0000000640), &(0x7f0000000740)}}, &(0x7f0000000840)) timer_settime(0x0, 0x0, &(0x7f0000000880), &(0x7f00000008c0)) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000900)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000d80)=ANY=[], 0x0, 0x0, &(0x7f0000000480)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") io_setup(0x0, &(0x7f0000000940)) io_submit(0x0, 0x0, &(0x7f0000000d40)) clock_gettime(0x0, &(0x7f00000005c0)) select(0x40, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000600)) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000e40)=""/157) 03:34:00 executing program 0: syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x105000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYBLOB="0200011db9a69a51d99f146baf4446fb57955fd8991e5909aa5da1fab23ae46d55b409303801edd1e620004d2adc73fe162842446f05f6"], 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80000000000046, 0x0) clock_settime(0x0, &(0x7f0000000100)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0', [{0x20, "2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a"}, {0x20, "766d6e657430f3"}], 0xa, "f232de1b1fd4c51e44a4cb0bea417fe06e20c49cfa83adf9ac1f8b784e26c05fd5ab4e3e212cb9af1de1c0aca8f0d96db3e7d922607e771f"}, 0x85) sendfile(r1, r2, &(0x7f0000000000)=0x40000, 0x2b428a52) 03:34:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) readlink(&(0x7f0000000140)='.\x00', &(0x7f0000000280)=""/105, 0x69) dup(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000017c0)="42805da00fef69dc0f01ee263a208600acc041cbcb420f6e887f2a00002900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a38f5c44379dfb9d6adbe90dfe2989f7e") mlockall(0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000002ac0)=""/4096) fchmod(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 03:34:01 executing program 2: clock_gettime(0x7, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') request_key(&(0x7f00000006c0)='pkcs7_test\x00', &(0x7f0000000900), &(0x7f0000000b00)='*$\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) getpid() geteuid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001780)={{{@in, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000700)=0xe8) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001880)) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in=@multicast2, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000019c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007dc0)={{{@in=@loopback, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000008440)=0xfffffffffffffeab) getegid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007ec0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000007fc0)=0xe8) getgroups(0x0, &(0x7f0000008000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008040)) stat(&(0x7f0000008080)='./file0\x00', &(0x7f00000080c0)) stat(&(0x7f0000008140)='./file0\x00', &(0x7f0000008180)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008240), &(0x7f0000008280)=0xc) getgroups(0x0, &(0x7f00000082c0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008400)={&(0x7f0000000200)=@proc, 0xc, &(0x7f0000001a00), 0x0, &(0x7f0000008300)}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "70144461f373c9de3fbcd2d8511517a6132c49ca52f5766e7188046d66a23a1d0cf71efb7e26bfcb42a21c09940ebf684568b0857fcd4563d6e7638c2b1f27e4", "b65a6d478bb1ac13a889648b91c5db11c6a16ce22d17d490029b1a2d64c9ab70b8845545a793e430b78a4287134aa04247f14f762bdef9b0942cb31c39369e2f", "4a7f3afd9effde715ba1939252b2bf66679f9f76c9a6f93ab63f13f668799df8"}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000b80), &(0x7f0000000740)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000880)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b40)) getpgid(0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@remote}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000ac0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f40)={@dev, @multicast1}, &(0x7f0000000f80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001000)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:01 executing program 0: syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x105000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYBLOB="0200011db9a69a51d99f146baf4446fb57955fd8991e5909aa5da1fab23ae46d55b409303801edd1e620004d2adc73fe162842446f05f6"], 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80000000000046, 0x0) clock_settime(0x0, &(0x7f0000000100)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0', [{0x20, "2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a"}, {0x20, "766d6e657430f3"}], 0xa, "f232de1b1fd4c51e44a4cb0bea417fe06e20c49cfa83adf9ac1f8b784e26c05fd5ab4e3e212cb9af1de1c0aca8f0d96db3e7d922607e771f"}, 0x85) sendfile(r1, r2, &(0x7f0000000000)=0x40000, 0x2b428a52) 03:34:01 executing program 0: syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x105000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYBLOB="0200011db9a69a51d99f146baf4446fb57955fd8991e5909aa5da1fab23ae46d55b409303801edd1e620004d2adc73fe162842446f05f6"], 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80000000000046, 0x0) clock_settime(0x0, &(0x7f0000000100)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0', [{0x20, "2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a"}, {0x20, "766d6e657430f3"}], 0xa, "f232de1b1fd4c51e44a4cb0bea417fe06e20c49cfa83adf9ac1f8b784e26c05fd5ab4e3e212cb9af1de1c0aca8f0d96db3e7d922607e771f"}, 0x85) sendfile(r1, r2, &(0x7f0000000000)=0x40000, 0x2b428a52) 03:34:01 executing program 4: syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x105000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYBLOB="0200011db9a69a51d99f146baf4446fb57955fd8991e5909aa5da1fab23ae46d55b409303801edd1e620004d2adc73fe162842446f05f6"], 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80000000000046, 0x0) clock_settime(0x0, &(0x7f0000000100)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0', [{0x20, "2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a"}, {0x20, "766d6e657430f3"}], 0xa, "f232de1b1fd4c51e44a4cb0bea417fe06e20c49cfa83adf9ac1f8b784e26c05fd5ab4e3e212cb9af1de1c0aca8f0d96db3e7d922607e771f"}, 0x85) sendfile(r1, r2, &(0x7f0000000000)=0x40000, 0x2b428a52) 03:34:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x41a}], 0x1, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000240), 0x8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x2, @in6=@mcast2}}, 0xe8) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:34:01 executing program 0: syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x105000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYBLOB="0200011db9a69a51d99f146baf4446fb57955fd8991e5909aa5da1fab23ae46d55b409303801edd1e620004d2adc73fe162842446f05f6"], 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80000000000046, 0x0) clock_settime(0x0, &(0x7f0000000100)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0', [{0x20, "2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a"}, {0x20, "766d6e657430f3"}], 0xa, "f232de1b1fd4c51e44a4cb0bea417fe06e20c49cfa83adf9ac1f8b784e26c05fd5ab4e3e212cb9af1de1c0aca8f0d96db3e7d922607e771f"}, 0x85) sendfile(r1, r2, &(0x7f0000000000)=0x40000, 0x2b428a52) 03:34:01 executing program 4: syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x105000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYBLOB="0200011db9a69a51d99f146baf4446fb57955fd8991e5909aa5da1fab23ae46d55b409303801edd1e620004d2adc73fe162842446f05f6"], 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80000000000046, 0x0) clock_settime(0x0, &(0x7f0000000100)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0', [{0x20, "2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a"}, {0x20, "766d6e657430f3"}], 0xa, "f232de1b1fd4c51e44a4cb0bea417fe06e20c49cfa83adf9ac1f8b784e26c05fd5ab4e3e212cb9af1de1c0aca8f0d96db3e7d922607e771f"}, 0x85) sendfile(r1, r2, &(0x7f0000000000)=0x40000, 0x2b428a52) 03:34:01 executing program 4: syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x105000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYBLOB="0200011db9a69a51d99f146baf4446fb57955fd8991e5909aa5da1fab23ae46d55b409303801edd1e620004d2adc73fe162842446f05f6"], 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80000000000046, 0x0) clock_settime(0x0, &(0x7f0000000100)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0', [{0x20, "2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a"}, {0x20, "766d6e657430f3"}], 0xa, "f232de1b1fd4c51e44a4cb0bea417fe06e20c49cfa83adf9ac1f8b784e26c05fd5ab4e3e212cb9af1de1c0aca8f0d96db3e7d922607e771f"}, 0x85) sendfile(r1, r2, &(0x7f0000000000)=0x40000, 0x2b428a52) 03:34:01 executing program 0: syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x105000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYBLOB="0200011db9a69a51d99f146baf4446fb57955fd8991e5909aa5da1fab23ae46d55b409303801edd1e620004d2adc73fe162842446f05f6"], 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80000000000046, 0x0) clock_settime(0x0, &(0x7f0000000100)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0', [{0x20, "2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a"}, {0x20, "766d6e657430f3"}], 0xa, "f232de1b1fd4c51e44a4cb0bea417fe06e20c49cfa83adf9ac1f8b784e26c05fd5ab4e3e212cb9af1de1c0aca8f0d96db3e7d922607e771f"}, 0x85) sendfile(r1, r2, &(0x7f0000000000)=0x40000, 0x2b428a52) 03:34:01 executing program 3: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) 03:34:02 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000ac0)=""/254, &(0x7f0000000bc0)=0xfe) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000002c0)) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000009c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)='9p\x00', 0x0, &(0x7f0000000c80)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xe8) getgroups(0x0, &(0x7f0000000500)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.redirect\x00', &(0x7f0000000600)='./file0\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000840), &(0x7f0000000880)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000008c0)=ANY=[], 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) syslog(0x0, &(0x7f0000000a00)=""/106, 0x6a) syz_execute_func(&(0x7f0000000200)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) readlink(&(0x7f0000000140)='.\x00', &(0x7f0000000280)=""/105, 0x69) dup(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000017c0)="42805da00fef69dc0f01ee263a208600acc041cbcb420f6e887f2a00002900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a38f5c44379dfb9d6adbe90dfe2989f7e") mlockall(0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000002ac0)=""/4096) fchmod(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 03:34:02 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x100000000000082, 0x0) read(r0, &(0x7f0000000300)=""/182, 0xb6) write$FUSE_ATTR(r0, &(0x7f0000000000)={0x78, 0x0, 0x1, {0x800000000007, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d050000}}}, 0x78) [ 540.737968] CUSE: unknown device info "" [ 540.777585] CUSE: DEVNAME unspecified 03:34:02 executing program 0: syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x105000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYBLOB="0200011db9a69a51d99f146baf4446fb57955fd8991e5909aa5da1fab23ae46d55b409303801edd1e620004d2adc73fe162842446f05f6"], 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80000000000046, 0x0) clock_settime(0x0, &(0x7f0000000100)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0', [{0x20, "2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a"}, {0x20, "766d6e657430f3"}], 0xa, "f232de1b1fd4c51e44a4cb0bea417fe06e20c49cfa83adf9ac1f8b784e26c05fd5ab4e3e212cb9af1de1c0aca8f0d96db3e7d922607e771f"}, 0x85) sendfile(r1, r2, &(0x7f0000000000)=0x40000, 0x2b428a52) [ 540.799793] CUSE: unknown device info "" [ 540.811504] CUSE: DEVNAME unspecified 03:34:02 executing program 2: prctl$intptr(0x2f, 0x3) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:02 executing program 0: syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x105000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYBLOB="0200011db9a69a51d99f146baf4446fb57955fd8991e5909aa5da1fab23ae46d55b409303801edd1e620004d2adc73fe162842446f05f6"], 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80000000000046, 0x0) clock_settime(0x0, &(0x7f0000000100)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0', [{0x20, "2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a"}, {0x20, "766d6e657430f3"}], 0xa, "f232de1b1fd4c51e44a4cb0bea417fe06e20c49cfa83adf9ac1f8b784e26c05fd5ab4e3e212cb9af1de1c0aca8f0d96db3e7d922607e771f"}, 0x85) sendfile(r1, r2, &(0x7f0000000000)=0x40000, 0x2b428a52) 03:34:02 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x41a}], 0x1, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000240), 0x8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x2, @in6=@mcast2}}, 0xe8) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:34:02 executing program 0: futex(&(0x7f0000000040), 0x3, 0xfffffffffffffffd, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x2c, 0x2f, 0x829, 0x0, 0x0, {0x3}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0x400000007000000}}]}]}, 0x2c}}, 0x0) 03:34:03 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000140), 0x7) 03:34:03 executing program 4: memfd_create(&(0x7f0000000180)="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", 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 541.550954] openvswitch: netlink: Duplicate key (type 0). 03:34:03 executing program 3: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/98) openat$mixer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000500), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a0636969ef69dc00d9c421a05d2fc4e2799ba10000010036650f198a1a5ba3c94d397c2a0f0fcdf30fd6d0300f38211a40a5c07f41dfe0400f01efe5e57d0fecba1a1a01460f01ee45dfde9f") 03:34:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) readlink(&(0x7f0000000140)='.\x00', &(0x7f0000000280)=""/105, 0x69) dup(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000017c0)="42805da00fef69dc0f01ee263a208600acc041cbcb420f6e887f2a00002900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a38f5c44379dfb9d6adbe90dfe2989f7e") mlockall(0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000002ac0)=""/4096) fchmod(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 03:34:03 executing program 0: syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x20040) seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000400)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6") getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x20) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000740), 0x8) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340), 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300)) userfaultfd(0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000004c0)) creat(&(0x7f0000000540)='./file0\x00', 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000032c0), 0x0, 0x0, &(0x7f0000003380)={0x0, 0x1c9c380}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'syz_tun\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000036c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000038c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in6, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000003a00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000a040), 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @multicast1}, &(0x7f000000a1c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a440)={'dummy0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a8c0)={{{@in, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f000000a9c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aa00)={@empty, @loopback}, &(0x7f000000aa40)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aac0)={@empty, @multicast2}, &(0x7f000000ab00)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ab40)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ac40)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000ad40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'tunl0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f000000ae40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000aec0)={'yam0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000af00)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f000000b000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b040)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b080)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f000000b0c0), &(0x7f000000b100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000b140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000b180)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b1c0)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f000000b2c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000bc80)={&(0x7f0000000800), 0xc, &(0x7f000000bc40)={&(0x7f000000b300)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037") getresuid(&(0x7f0000000580), &(0x7f0000000680), &(0x7f0000000780)) 03:34:03 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/133, 0x85) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x41a}], 0x1, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000240), 0x8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x2, @in6=@mcast2}}, 0xe8) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:34:04 executing program 4: accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000480)={0x0, @in={{0x2, 0x0, @dev}}}, &(0x7f0000000200)=0x100) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local}}}}, &(0x7f0000000380)=0xb0) 03:34:04 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000300)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x28, {0x2, 0x0, @multicast1}, 'erspan0\x00'}) 03:34:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) readlink(&(0x7f0000000140)='.\x00', &(0x7f0000000280)=""/105, 0x69) dup(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000017c0)="42805da00fef69dc0f01ee263a208600acc041cbcb420f6e887f2a00002900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a38f5c44379dfb9d6adbe90dfe2989f7e") mlockall(0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000002ac0)=""/4096) fchmod(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 03:34:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0x3, 0x0, 0x0, @loopback}}}, &(0x7f00000001c0)=0x90) close(r2) close(r1) 03:34:04 executing program 3: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003480)={{{@in6=@loopback, @in=@remote}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000003580)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000035c0)) geteuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) getuid() getgroups(0x0, &(0x7f0000003640)) gettid() geteuid() stat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003c80)) fstat(0xffffffffffffffff, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d40)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:04 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @dev}, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'lo\x00'}) pipe(&(0x7f00000000c0)) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000480)={'filter\x00'}, &(0x7f0000000500)=0x78) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0xe8) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000540), 0xc, &(0x7f00000016c0)={&(0x7f0000001740)=ANY=[]}}, 0x0) 03:34:04 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x400000000032, &(0x7f0000000040)=0x1000000, 0x4) 03:34:04 executing program 3: socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000000307031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 543.147632] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. 03:34:04 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x400000000032, &(0x7f0000000040)=0x1000000, 0x4) 03:34:04 executing program 3: clock_gettime(0x6, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0x3e4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000044c0)=0xe8) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004680), &(0x7f00000046c0)=0xc) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:04 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, &(0x7f0000000040), &(0x7f0000000c00)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x800, 'lo\x00', 'teql0\x00', 'ip6_vti0\x00', 'bcsf0\x00', @broadcast, [], @dev, [], 0x1e0, 0x210, 0x240, [@ip={'ip\x00', 0x20, {{@remote, @broadcast, 0x0, 0x0, 0x0, 0x6, 0x2d}}}, @comment={'comment\x00', 0x100}]}, [@common=@AUDIT={'AUDIT\x00', 0x8}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x348) 03:34:04 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x400000000032, &(0x7f0000000040)=0x1000000, 0x4) 03:34:05 executing program 4: clock_getres(0x5, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:34:05 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffff9c, 0x28, &(0x7f00000000c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) geteuid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000940)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000180)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004300)={{{@in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000004400)=0xe8) getgroups(0x0, &(0x7f0000004440)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) geteuid() 03:34:05 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x400000000032, &(0x7f0000000040)=0x1000000, 0x4) 03:34:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x8, &(0x7f0000000340)) r0 = socket$inet6(0xa, 0x100000003, 0x80000000000006) r1 = socket$packet(0x11, 0x808000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x5}, 0x4) sched_setaffinity(0x0, 0x4, &(0x7f00000000c0)=0x80000001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./file0\x00', 0x100007) getdents(r2, &(0x7f0000000400)=""/240, 0xf0) 03:34:05 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$lock(r0, 0x6, &(0x7f0000000000)={0x0, 0x2}) 03:34:05 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0a, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000340)=0x3, 0x4) ioctl$TCGETS(r0, 0x5401, &(0x7f00000000c0)) eventfd2(0x10000000003b, 0x1) signalfd4(0xffffffffffffffff, &(0x7f0000000300)={0x1}, 0x8, 0x1) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='\x00'}, 0xffffffffffffff7d) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000200)={{0x80000000, 0x8}, 'port1\x00', 0x20, 0x8, 0x4, 0x0, 0x3ff, 0xa1f, 0x1f, 0x0, 0x3}) 03:34:05 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x200000000000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0xfdffffff00000000, 0x0, 0x2}, 'syz0\x00'}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000880)=""/233) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup3(r1, r0, 0x0) 03:34:05 executing program 0: keyctl$set_reqkey_keyring(0x3, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") [ 544.112667] input: syz1 as /devices/virtual/input/input19 03:34:05 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x0, 0x200) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000300)=0x28000000, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000480)) accept4$nfc_llcp(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x800) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000180)=0x6, 0x4) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000400)=@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}, 0x18) sendmmsg(r3, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 03:34:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x8, &(0x7f0000000340)) r0 = socket$inet6(0xa, 0x100000003, 0x80000000000006) r1 = socket$packet(0x11, 0x808000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x5}, 0x4) sched_setaffinity(0x0, 0x4, &(0x7f00000000c0)=0x80000001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./file0\x00', 0x100007) getdents(r2, &(0x7f0000000400)=""/240, 0xf0) [ 544.421011] input: syz1 as /devices/virtual/input/input20 03:34:06 executing program 4: timerfd_create(0x8, 0x0) prctl$setmm(0x1c, 0x0, &(0x7f0000ff7000/0x2000)=nil) creat(&(0x7f0000000740)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) waitid(0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @multicast1}, &(0x7f00000004c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000540)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000006c0)={@dev, @local}, &(0x7f0000000700)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000008c0), &(0x7f0000000900)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000b00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40)={@multicast2, @dev}, &(0x7f0000000b80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000bc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000dc0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000fc0)={0x0, @remote, @loopback}, &(0x7f0000001000)=0xc) accept(0xffffffffffffffff, &(0x7f0000001040)=@hci, &(0x7f00000010c0)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001100)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001200)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001240)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000001340)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001380)={{{@in=@multicast1, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001480)=0xe8) 03:34:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='hybla\x00', 0x6) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 03:34:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x8, &(0x7f0000000340)) r0 = socket$inet6(0xa, 0x100000003, 0x80000000000006) r1 = socket$packet(0x11, 0x808000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x5}, 0x4) sched_setaffinity(0x0, 0x4, &(0x7f00000000c0)=0x80000001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./file0\x00', 0x100007) getdents(r2, &(0x7f0000000400)=""/240, 0xf0) 03:34:06 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getgid() syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:06 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0a, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000340)=0x3, 0x4) ioctl$TCGETS(r0, 0x5401, &(0x7f00000000c0)) eventfd2(0x10000000003b, 0x1) signalfd4(0xffffffffffffffff, &(0x7f0000000300)={0x1}, 0x8, 0x1) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='\x00'}, 0xffffffffffffff7d) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000200)={{0x80000000, 0x8}, 'port1\x00', 0x20, 0x8, 0x4, 0x0, 0x3ff, 0xa1f, 0x1f, 0x0, 0x3}) 03:34:06 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0a, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000340)=0x3, 0x4) ioctl$TCGETS(r0, 0x5401, &(0x7f00000000c0)) eventfd2(0x10000000003b, 0x1) signalfd4(0xffffffffffffffff, &(0x7f0000000300)={0x1}, 0x8, 0x1) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='\x00'}, 0xffffffffffffff7d) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000200)={{0x80000000, 0x8}, 'port1\x00', 0x20, 0x8, 0x4, 0x0, 0x3ff, 0xa1f, 0x1f, 0x0, 0x3}) 03:34:06 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r0, 0x65, 0x6, &(0x7f0000cbc000)=""/244, &(0x7f00000000c0)=0xf4) 03:34:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x8, &(0x7f0000000340)) r0 = socket$inet6(0xa, 0x100000003, 0x80000000000006) r1 = socket$packet(0x11, 0x808000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x5}, 0x4) sched_setaffinity(0x0, 0x4, &(0x7f00000000c0)=0x80000001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./file0\x00', 0x100007) getdents(r2, &(0x7f0000000400)=""/240, 0xf0) 03:34:07 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) ptrace(0x4207, r0) r1 = memfd_create(&(0x7f00000000c0)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0) ptrace$setopts(0x4206, r0, 0x3, 0x4) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000180)) r2 = syz_open_dev$sndctrl(&(0x7f0000000d00)='/dev/snd/controlC#\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000d300000000028000007a0a00ffffffff006b01"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000500)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000b60c6ec4000000000000050000000000000000000000000000009500000040000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f0000000300)=""/187}, 0x48) ioctl(0xffffffffffffffff, 0x200008912, &(0x7f00000001c0)="0047fc2f07d82c99240970") socket$inet(0x10, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000000)=""/18) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc0405519, &(0x7f0000001000)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r3, 0x540e, 0x0) 03:34:07 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x0, 0x200) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000300)=0x28000000, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000480)) accept4$nfc_llcp(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x800) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000180)=0x6, 0x4) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000400)=@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}, 0x18) sendmmsg(r3, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 03:34:07 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0a, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000340)=0x3, 0x4) ioctl$TCGETS(r0, 0x5401, &(0x7f00000000c0)) eventfd2(0x10000000003b, 0x1) signalfd4(0xffffffffffffffff, &(0x7f0000000300)={0x1}, 0x8, 0x1) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='\x00'}, 0xffffffffffffff7d) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000200)={{0x80000000, 0x8}, 'port1\x00', 0x20, 0x8, 0x4, 0x0, 0x3ff, 0xa1f, 0x1f, 0x0, 0x3}) 03:34:07 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0a, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000340)=0x3, 0x4) ioctl$TCGETS(r0, 0x5401, &(0x7f00000000c0)) eventfd2(0x10000000003b, 0x1) signalfd4(0xffffffffffffffff, &(0x7f0000000300)={0x1}, 0x8, 0x1) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='\x00'}, 0xffffffffffffff7d) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000200)={{0x80000000, 0x8}, 'port1\x00', 0x20, 0x8, 0x4, 0x0, 0x3ff, 0xa1f, 0x1f, 0x0, 0x3}) 03:34:07 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) ptrace(0x4207, r0) r1 = memfd_create(&(0x7f00000000c0)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0) ptrace$setopts(0x4206, r0, 0x3, 0x4) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000180)) r2 = syz_open_dev$sndctrl(&(0x7f0000000d00)='/dev/snd/controlC#\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000d300000000028000007a0a00ffffffff006b01"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000500)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000b60c6ec4000000000000050000000000000000000000000000009500000040000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f0000000300)=""/187}, 0x48) ioctl(0xffffffffffffffff, 0x200008912, &(0x7f00000001c0)="0047fc2f07d82c99240970") socket$inet(0x10, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000000)=""/18) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc0405519, &(0x7f0000001000)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r3, 0x540e, 0x0) 03:34:08 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) ptrace(0x4207, r0) r1 = memfd_create(&(0x7f00000000c0)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0) ptrace$setopts(0x4206, r0, 0x3, 0x4) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000180)) r2 = syz_open_dev$sndctrl(&(0x7f0000000d00)='/dev/snd/controlC#\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000d300000000028000007a0a00ffffffff006b01"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000500)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000b60c6ec4000000000000050000000000000000000000000000009500000040000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f0000000300)=""/187}, 0x48) ioctl(0xffffffffffffffff, 0x200008912, &(0x7f00000001c0)="0047fc2f07d82c99240970") socket$inet(0x10, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000000)=""/18) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc0405519, &(0x7f0000001000)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r3, 0x540e, 0x0) 03:34:08 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x0, 0x200) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000300)=0x28000000, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000480)) accept4$nfc_llcp(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x800) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000180)=0x6, 0x4) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000400)=@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}, 0x18) sendmmsg(r3, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 03:34:08 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) ptrace(0x4207, r0) r1 = memfd_create(&(0x7f00000000c0)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0) ptrace$setopts(0x4206, r0, 0x3, 0x4) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000180)) r2 = syz_open_dev$sndctrl(&(0x7f0000000d00)='/dev/snd/controlC#\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000d300000000028000007a0a00ffffffff006b01"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000500)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000b60c6ec4000000000000050000000000000000000000000000009500000040000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f0000000300)=""/187}, 0x48) ioctl(0xffffffffffffffff, 0x200008912, &(0x7f00000001c0)="0047fc2f07d82c99240970") socket$inet(0x10, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000000)=""/18) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc0405519, &(0x7f0000001000)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r3, 0x540e, 0x0) 03:34:08 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0a, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000340)=0x3, 0x4) ioctl$TCGETS(r0, 0x5401, &(0x7f00000000c0)) eventfd2(0x10000000003b, 0x1) signalfd4(0xffffffffffffffff, &(0x7f0000000300)={0x1}, 0x8, 0x1) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='\x00'}, 0xffffffffffffff7d) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000200)={{0x80000000, 0x8}, 'port1\x00', 0x20, 0x8, 0x4, 0x0, 0x3ff, 0xa1f, 0x1f, 0x0, 0x3}) 03:34:08 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0a, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000340)=0x3, 0x4) ioctl$TCGETS(r0, 0x5401, &(0x7f00000000c0)) eventfd2(0x10000000003b, 0x1) signalfd4(0xffffffffffffffff, &(0x7f0000000300)={0x1}, 0x8, 0x1) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='\x00'}, 0xffffffffffffff7d) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000200)={{0x80000000, 0x8}, 'port1\x00', 0x20, 0x8, 0x4, 0x0, 0x3ff, 0xa1f, 0x1f, 0x0, 0x3}) 03:34:09 executing program 0: clock_gettime(0x4000000000007, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000540)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) io_setup(0x0, &(0x7f0000000140)) openat$null(0xffffffffffffff9c, &(0x7f0000000680)='/dev/null\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000a80)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c40)={&(0x7f0000000c00)='/dev/usbmon#\x00'}, 0x10) syz_open_dev$mice(&(0x7f0000000d00)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000e40)='/dev/vcs#\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/hwrng\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000fc0)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000180)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000580)) syz_open_dev$usbmon(&(0x7f00000005c0)='/dev/usbmon#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0xe8) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000480)={0xa0}, 0xa0) 03:34:09 executing program 4: keyctl$dh_compute(0x1d, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:09 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x0, 0x200) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000300)=0x28000000, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000480)) accept4$nfc_llcp(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x800) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000180)=0x6, 0x4) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000400)=@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}, 0x18) sendmmsg(r3, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 03:34:09 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x0, 0x200) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000300)=0x28000000, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000480)) accept4$nfc_llcp(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x800) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000180)=0x6, 0x4) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000400)=@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}, 0x18) sendmmsg(r3, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 03:34:09 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x105000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000640)={0x0, 0x3}, &(0x7f0000000680)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000006c0)={r1, 0x2, 0x1, "b9"}, 0x9) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000740)={0x28, 0x0, 0x0, @host}, 0x10) ioctl$void(0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80000000000046, 0x0) clock_settime(0x0, &(0x7f0000000100)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") sendfile(r3, r4, &(0x7f0000000000), 0x2b428a52) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r2, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000700)={0x7}) 03:34:09 executing program 5: getrandom(&(0x7f00000006c0)=""/148, 0x34a, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:09 executing program 2: pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x0, 0x231) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000180)=""/47, &(0x7f0000000200)=0x2f) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00'}, {@rand_addr}}, 0x44) syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@remote, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000007c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000900)=0xe8) getgroups(0x0, &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in=@local, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) gettid() lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) getpid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f40), &(0x7f0000000f80)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgroups(0x0, &(0x7f0000001040)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001080)) getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001200)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001280)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001380)=0xe8) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001640)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001680)={{{@in, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000001780)=0xe8) stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) getpgid(0x0) getresuid(&(0x7f0000001880), &(0x7f00000018c0), &(0x7f0000001900)) getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c80)={{{@in=@remote, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001d80)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgroups(0x0, &(0x7f0000001dc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001e00)) fstat(0xffffffffffffffff, &(0x7f0000001e40)) getgroups(0x0, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001f40)={{{@in=@local, @in=@broadcast}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000002040)=0xe8) lstat(&(0x7f0000002080)='./file1\x00', &(0x7f00000020c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002440)='./file0\x00', &(0x7f0000002480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002500), &(0x7f0000002540)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002580)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000025c0)={{{@in6=@dev, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000026c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:10 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x400000007}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000c88000)={r1, &(0x7f0000000080), &(0x7f000089b000)}, 0x18) 03:34:10 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x0, 0x200) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000300)=0x28000000, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000480)) accept4$nfc_llcp(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x800) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000180)=0x6, 0x4) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000400)=@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}, 0x18) sendmmsg(r3, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 03:34:10 executing program 5: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffb) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x14f, 0x9, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}}, 0x43) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r1, &(0x7f0000000900)={0x2, 0x0, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000)="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", 0x480, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='setgroups\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000540), 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r3) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, r4) timer_create(0x7, &(0x7f0000000500)={0x0, 0x13, 0x6}, &(0x7f0000000840)=0x0) timer_gettime(r5, &(0x7f0000000a80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@local, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setgid(r6) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400002, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f00000002c0), &(0x7f0000000380)=0x5) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000400)={@ipv4={[], [], @broadcast}}) r8 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000), 0x0, 0x0, r4) ioctl$BLKTRACETEARDOWN(r7, 0x1276, 0x0) r9 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00), &(0x7f00000000c0)="7f", 0x1, r8) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0xfffffffffffffffc}, 0x2c) r10 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f0000000140), &(0x7f0000000280), 0x240, r0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000800)=0x2, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000340)={r9, r10, r10}, &(0x7f0000000600)=""/132, 0xff7d, 0x0) 03:34:10 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x0, 0x200) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000300)=0x28000000, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000480)) accept4$nfc_llcp(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x800) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000180)=0x6, 0x4) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000400)=@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}, 0x18) sendmmsg(r3, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 03:34:10 executing program 4: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000b80)={0x77359400}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='cifs.spnego\x00', &(0x7f00000008c0), &(0x7f0000000500)="657468302da78100", 0xfffffffffffffffd) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0), 0xc5) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000600)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a80)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000a40), 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x14}, 0x14}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000004c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f0000000800)) getgroups(0x0, &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f0000000900)) getgroups(0x0, &(0x7f0000000980)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f00000009c0)=ANY=[], 0x0, 0x0) mount(&(0x7f0000000540)=ANY=[], &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuseblk\x00', 0x0, &(0x7f0000000400)='/dev/rtc\x00') fchmod(0xffffffffffffffff, 0x0) getgroups(0x0, &(0x7f0000000140)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:10 executing program 0: socket$unix(0x1, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) chmod(&(0x7f0000000540)='./file0\x00', 0x0) dup(0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000200)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getegid() getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000680), &(0x7f0000000640)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) poll(&(0x7f0000000500), 0x0, 0x0) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) setresgid(0x0, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000140)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:10 executing program 2: sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000400)={0x1b, &(0x7f0000000440)}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) uselib(&(0x7f0000000080)='./file0\x00') lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000003c0), 0x8) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000600)=ANY=[]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f00000001c0), 0x4) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.opaque\x00', &(0x7f0000000180)='mime_type.\x00', 0xb, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000240)) timer_create(0x0, &(0x7f0000000380), &(0x7f0000000180)) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000400), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000600)=""/239) socket$inet_tcp(0x2, 0x1, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001e80)={{{@in=@local, @in6=@mcast2}}, {{@in6}, 0x0, @in6}}, &(0x7f0000001f80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002000)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002380)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000023c0)={{{@in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000024c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002500)={@dev, @broadcast}, &(0x7f0000002540)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002680)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f00000029c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002a00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a40)={'irlan0\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002cc0)={&(0x7f0000000700), 0xc, &(0x7f0000002c80)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000500)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f00000018c0)=""/55, 0x37}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x0, @multicast1}, 0x10) 03:34:11 executing program 5: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffb) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x14f, 0x9, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}}, 0x43) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r1, &(0x7f0000000900)={0x2, 0x0, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000)="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", 0x480, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='setgroups\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000540), 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r3) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, r4) timer_create(0x7, &(0x7f0000000500)={0x0, 0x13, 0x6}, &(0x7f0000000840)=0x0) timer_gettime(r5, &(0x7f0000000a80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@local, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setgid(r6) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400002, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f00000002c0), &(0x7f0000000380)=0x5) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000400)={@ipv4={[], [], @broadcast}}) r8 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000), 0x0, 0x0, r4) ioctl$BLKTRACETEARDOWN(r7, 0x1276, 0x0) r9 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00), &(0x7f00000000c0)="7f", 0x1, r8) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0xfffffffffffffffc}, 0x2c) r10 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f0000000140), &(0x7f0000000280), 0x240, r0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000800)=0x2, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000340)={r9, r10, r10}, &(0x7f0000000600)=""/132, 0xff7d, 0x0) 03:34:11 executing program 4: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:11 executing program 4: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:11 executing program 5: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffb) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x14f, 0x9, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}}, 0x43) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r1, &(0x7f0000000900)={0x2, 0x0, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000)="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", 0x480, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='setgroups\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000540), 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r3) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, r4) timer_create(0x7, &(0x7f0000000500)={0x0, 0x13, 0x6}, &(0x7f0000000840)=0x0) timer_gettime(r5, &(0x7f0000000a80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@local, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setgid(r6) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400002, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f00000002c0), &(0x7f0000000380)=0x5) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000400)={@ipv4={[], [], @broadcast}}) r8 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000), 0x0, 0x0, r4) ioctl$BLKTRACETEARDOWN(r7, 0x1276, 0x0) r9 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00), &(0x7f00000000c0)="7f", 0x1, r8) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0xfffffffffffffffc}, 0x2c) r10 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f0000000140), &(0x7f0000000280), 0x240, r0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000800)=0x2, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000340)={r9, r10, r10}, &(0x7f0000000600)=""/132, 0xff7d, 0x0) 03:34:11 executing program 1: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe2(&(0x7f00000004c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:11 executing program 4: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:11 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='lo#ppp1#user\x00', 0xffffffffffffff9c}, 0x10) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000140)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000007c0)) mremap(&(0x7f0000fef000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0'}, 0xb) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@nl, &(0x7f0000000700)=0x80) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000900)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000240)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000340)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000400)) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000540)={0x78}, 0x78) open_by_handle_at(0xffffffffffffffff, &(0x7f00000005c0)={0x8}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000740), &(0x7f0000000780)=0x4) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000440)={'bridge0\x00', {0x2, 0x0, @dev}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") accept4(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000600), 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) ioprio_set$pid(0x0, 0x0, 0x0) 03:34:11 executing program 2: capset(&(0x7f00000001c0)={0x19980330}, &(0x7f0000000200)) mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)=@known='security.capability\x00', &(0x7f0000000080)="00000002010000000000e4000400000000000400", 0x14, 0x0) 03:34:11 executing program 3: syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x20040) seccomp(0x0, 0x0, &(0x7f0000000580)={0x0, &(0x7f0000000400)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6") getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x20) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000740), 0x8) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340), 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300)) userfaultfd(0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000004c0)) creat(&(0x7f0000000540)='./file0\x00', 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000032c0), 0x0, 0x0, &(0x7f0000003380)={0x0, 0x1c9c380}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'syz_tun\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000036c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000038c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in6, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000003a00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000a040), 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a8c0)={{{@in, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f000000a9c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aa00)={@empty, @loopback}, &(0x7f000000aa40)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aac0)={@empty, @multicast2}, &(0x7f000000ab00)=0xc) syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037") 03:34:11 executing program 4: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:11 executing program 5: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffb) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x14f, 0x9, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}}, 0x43) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r1, &(0x7f0000000900)={0x2, 0x0, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000)="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", 0x480, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='setgroups\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000540), 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r3) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, r4) timer_create(0x7, &(0x7f0000000500)={0x0, 0x13, 0x6}, &(0x7f0000000840)=0x0) timer_gettime(r5, &(0x7f0000000a80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@local, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setgid(r6) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400002, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f00000002c0), &(0x7f0000000380)=0x5) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000400)={@ipv4={[], [], @broadcast}}) r8 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000), 0x0, 0x0, r4) ioctl$BLKTRACETEARDOWN(r7, 0x1276, 0x0) r9 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00), &(0x7f00000000c0)="7f", 0x1, r8) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0xfffffffffffffffc}, 0x2c) r10 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f0000000140), &(0x7f0000000280), 0x240, r0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000800)=0x2, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000340)={r9, r10, r10}, &(0x7f0000000600)=""/132, 0xff7d, 0x0) 03:34:11 executing program 2: prctl$intptr(0x2b, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') getsockname$inet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000500)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:12 executing program 4: timerfd_create(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000280)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000140), &(0x7f0000000240)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) memfd_create(&(0x7f0000000300)="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", 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000080)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000004c0), &(0x7f0000000500)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 03:34:12 executing program 2: keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000fc0)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000010c0)=0xe8) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) 03:34:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_nanosleep(0xb, 0x0, &(0x7f0000000040), &(0x7f0000003c00)) 03:34:12 executing program 5: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000c97ff8)) syz_emit_ethernet(0x0, &(0x7f00000003c0)=ANY=[], &(0x7f00000000c0)) syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000004c0)=""/15) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$getreaper(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f00000001c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getgid() 03:34:12 executing program 5: keyctl$invalidate(0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@mcast2, @in6}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) request_key(&(0x7f00000006c0)='big_key\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/adsp#\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000780)='blacklist\x00', &(0x7f00000007c0), &(0x7f0000000800)='/vmnet0&louser\x00', 0x0) add_key(&(0x7f0000000840)='blacklist\x00', &(0x7f0000000880), &(0x7f00000008c0), 0x0, 0xfffffffffffffff9) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) getgroups(0x0, &(0x7f0000000d80)) lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/snapshot\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffff9c, 0x0) dup(0xffffffffffffffff) socket$pppoe(0x18, 0x1, 0x0) lstat(&(0x7f0000000ec0)='.\x00', &(0x7f0000000f00)) getgid() syz_open_pts(0xffffffffffffff9c, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000001140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001180)=0x14, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/dsp\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001200)='/dev/hwrng\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000001240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) userfaultfd(0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000001280)='/dev/dsp\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(0xffffffffffffffff, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000001300)='/dev/null\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001340)='cpu.stat\x00', 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000001380)='/dev/audio\x00', 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000001400)='/dev/sg#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001440), &(0x7f0000001480)=0xc) stat(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)) pipe2(&(0x7f0000001580), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000015c0)={0xffffffffffffffff}, 0xc) getgroups(0x0, &(0x7f0000001880)) socket$can_raw(0x1d, 0x3, 0x1) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000018c0), 0x0) inotify_init1(0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000001900)='/dev/vhost-net\x00', 0x2, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000001940)='/dev/uinput\x00', 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001a00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000004c0)="428055a0610fef69dce9e42a5c41ff0f8f49189850312ef2f2ec712d0f76382127c42127fd2520410feefa4e217919fbfbf54177455de0932ebc2ebc0d64ac1e5d9f997f") 03:34:12 executing program 0: keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x58fe6}]}) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000040), &(0x7f00000000c0)=0x20) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140), &(0x7f0000000180)=0x8) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000003c0)={@multicast1, @broadcast}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in=@multicast2, @in6=@ipv4={[], [], @loopback}}}, {{@in=@multicast2}}}, &(0x7f00000001c0)=0xe8) socket$inet6_dccp(0xa, 0x6, 0x0) syz_execute_func(&(0x7f0000000200)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:34:12 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) futex(&(0x7f0000000380), 0x5, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f00000005c0), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f00000007c0)={0x7}, 0x7) openat(0xffffffffffffffff, &(0x7f00000018c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='.request_key_auth\x00', &(0x7f0000000600), &(0x7f0000000640)='keyring\x00', 0x0) add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0x0) add_key(&(0x7f0000000580)='user\x00', &(0x7f00000006c0), 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x6, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000001a00)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'tunl0\x00'}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000400), 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000840)) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@loopback, @in6=@local}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000b80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) getresuid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@rand_addr, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000e80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) getgid() getgroups(0x0, &(0x7f0000000f40)) lstat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)) getresgid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getresgid(&(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) lstat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000a40)='system.posix_acl_access\x00', &(0x7f0000001380), 0x24, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) add_key(&(0x7f0000000500)='big_key\x00', &(0x7f0000000540), &(0x7f0000000600), 0x0, 0xfffffffffffffff9) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000240)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000001780)=[@textreal={0x8, &(0x7f00000017c0)="64f3a666b99f0200000f320f09b809008ec8360fa3e70f20d7660fd2190f01cb0f20e06635004000000f22e036fa"}], 0xaaaaaaaaaaaad8c, 0x0, &(0x7f0000000580), 0x0) 03:34:13 executing program 2: keyctl$set_reqkey_keyring(0x13, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$autofs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000300)=0x86) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000480)) 03:34:13 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x20000000102, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000200)='./file0//ile0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="15f01aa8e84e00814b4f203b34140700000000000000ffffff"], &(0x7f0000000500), 0x1400) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f00000000c0)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x11}]}, 0x30}}, 0x0) [ 552.051079] netlink: 'syz-executor4': attribute type 17 has an invalid length. 03:34:13 executing program 1: io_setup(0x40, &(0x7f00000000c0)) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f0000000140)) linkat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getpgrp(0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in=@broadcast}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000a00)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000010c0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001100)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @local}, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000002b40)=0xe8) getgid() gettid() getuid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 552.157772] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:13 executing program 3: timerfd_create(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000280)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000140), &(0x7f0000000240)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) memfd_create(&(0x7f0000000300)="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", 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000080)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") [ 552.285286] cgroup: fork rejected by pids controller in /syz0 03:34:13 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x20000000102, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000200)='./file0//ile0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="15f01aa8e84e00814b4f203b34140700000000000000ffffff"], &(0x7f0000000500), 0x1400) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f00000000c0)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x11}]}, 0x30}}, 0x0) 03:34:13 executing program 0: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x20000000102, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000200)='./file0//ile0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="15f01aa8e84e00814b4f203b34140700000000000000ffffff"], &(0x7f0000000500), 0x1400) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f00000000c0)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x11}]}, 0x30}}, 0x0) [ 552.536707] netlink: 'syz-executor4': attribute type 17 has an invalid length. [ 552.642209] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:14 executing program 2: openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0xfffffffffffffffd, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) keyctl$set_reqkey_keyring(0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) modify_ldt$write2(0x11, &(0x7f0000000340), 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780), 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 552.762499] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 552.899609] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:14 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x20000000102, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000200)='./file0//ile0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="15f01aa8e84e00814b4f203b34140700000000000000ffffff"], &(0x7f0000000500), 0x1400) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f00000000c0)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x11}]}, 0x30}}, 0x0) 03:34:14 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 553.117115] netlink: 'syz-executor4': attribute type 17 has an invalid length. 03:34:14 executing program 0: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x20000000102, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000200)='./file0//ile0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="15f01aa8e84e00814b4f203b34140700000000000000ffffff"], &(0x7f0000000500), 0x1400) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f00000000c0)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x11}]}, 0x30}}, 0x0) 03:34:14 executing program 3: clock_getres(0x6, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000080)={0x9}, 0x9) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") [ 553.245614] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 553.379550] netlink: 'syz-executor0': attribute type 17 has an invalid length. 03:34:14 executing program 1: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x49) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000060002000009a979a121b80c7bc8790405c7dcd62e0a53b232394938d36d0ef5ffa8ffffffff819a2b0a6606e43a620170a00021f069ca021f6f65dcf360e7e58f358c00f9ecff0158d19bcb2a5130fffffffffffff300b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151cb184a"}, 0x80) 03:34:15 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x20000000102, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000200)='./file0//ile0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="15f01aa8e84e00814b4f203b34140700000000000000ffffff"], &(0x7f0000000500), 0x1400) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f00000000c0)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x11}]}, 0x30}}, 0x0) [ 553.489143] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:15 executing program 1: socket$inet6_sctp(0xa, 0x1, 0x84) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:34:15 executing program 0: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x20000000102, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000200)='./file0//ile0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="15f01aa8e84e00814b4f203b34140700000000000000ffffff"], &(0x7f0000000500), 0x1400) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f00000000c0)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x11}]}, 0x30}}, 0x0) [ 553.703745] netlink: 'syz-executor4': attribute type 17 has an invalid length. 03:34:15 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000), 0x10) setsockopt(r0, 0x65, 0x1, &(0x7f0000000040)="2b90365c824c5b00", 0x8) [ 553.820740] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 553.950464] netlink: 'syz-executor0': attribute type 17 has an invalid length. 03:34:15 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:15 executing program 4: syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @broadcast, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0xffffff86, 0x8, 0x0, 0x0, 0x0, [{}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000000)) [ 554.087592] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000001800)=""/11, 0xb) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000200)={0x3000, 0x5000}) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, &(0x7f00000004c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0xa3, &(0x7f0000000100)="76b92cb4bdb33b9c7c614aba2ed8", &(0x7f0000000040)=""/163, 0xecc}, 0x28) pkey_alloc(0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x3}, &(0x7f0000000180)=0x14) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffff9c, 0x0) close(r1) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_open(&(0x7f00000004c0)='.#\x00', 0x0, 0x0, &(0x7f0000000840)) getgid() timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000340), &(0x7f0000000500)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x1, 0xfffffffffffffffd, 0x2, 0x401}, 0xc) 03:34:15 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xfffffffe) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000280)) clock_nanosleep(0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003e00), 0x0, 0x0, &(0x7f0000003fc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@mcast2, @in6=@mcast2}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in=@dev, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004280)=0xd8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in6=@mcast1, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da01245cf0f01eece73fe470f006f92380f8ac469df1af3f081768cc8000601c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541f20f38f01a0f2e1ad6fb0703") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:15 executing program 4: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='oE'], 0x2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000080), &(0x7f0000000140), 0x1000) 03:34:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='sysfs\x00', 0x0, &(0x7f0000000100)) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) 03:34:16 executing program 1: semget(0x3, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000040)=""/38) futimesat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:34:16 executing program 4: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000a80)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xffffffffffffff3f) 03:34:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000001800)=""/11, 0xb) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000200)={0x3000, 0x5000}) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, &(0x7f00000004c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0xa3, &(0x7f0000000100)="76b92cb4bdb33b9c7c614aba2ed8", &(0x7f0000000040)=""/163, 0xecc}, 0x28) pkey_alloc(0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x3}, &(0x7f0000000180)=0x14) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffff9c, 0x0) close(r1) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_open(&(0x7f00000004c0)='.#\x00', 0x0, 0x0, &(0x7f0000000840)) getgid() timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000340), &(0x7f0000000500)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x1, 0xfffffffffffffffd, 0x2, 0x401}, 0xc) [ 554.703579] sysfs: Unknown parameter 'trusted.overlay.origin' 03:34:16 executing program 0: socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000380)) accept(0xffffffffffffffff, &(0x7f0000000300)=@nl=@unspec, &(0x7f0000000200)=0x13d) getpeername(0xffffffffffffffff, &(0x7f0000006900)=@hci, &(0x7f0000004600)=0xa75b89f89a612162) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000800)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getresuid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001180)={{{@in, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000001280)=0xe8) lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000000140)) getpid() getuid() getresgid(&(0x7f0000001380), &(0x7f00000013c0), &(0x7f0000001400)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001440)) lstat(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001540)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000001640)=0xe8) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f40), &(0x7f00000000c0)=0xfffffffffffffcc0) getuid() getgroups(0x0, &(0x7f0000003fc0)) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004000)={{{@in=@dev, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000004100)=0xe8) getegid() fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000004140)='./file0\x00', &(0x7f0000004180)) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000004340)) getpgid(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000004440)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004640)={{{@in6=@mcast2, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000004740)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004780), &(0x7f00000047c0)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004800), &(0x7f0000004840)=0xc) stat(&(0x7f0000004880)='./file0\x00', &(0x7f00000048c0)) getpid() geteuid() getegid() accept$packet(0xffffffffffffffff, &(0x7f0000006040), &(0x7f0000006080)=0x14) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000060c0)) getresuid(&(0x7f0000006100), &(0x7f0000006140), &(0x7f0000006180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000061c0), &(0x7f0000000b40)=0x61) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006240)) getresuid(&(0x7f0000000500), &(0x7f00000062c0), &(0x7f00000004c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006340), &(0x7f0000006380)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000063c0)) fstat(0xffffffffffffffff, &(0x7f0000006400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000001800)=""/11, 0xb) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000200)={0x3000, 0x5000}) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, &(0x7f00000004c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0xa3, &(0x7f0000000100)="76b92cb4bdb33b9c7c614aba2ed8", &(0x7f0000000040)=""/163, 0xecc}, 0x28) pkey_alloc(0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x3}, &(0x7f0000000180)=0x14) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffff9c, 0x0) close(r1) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_open(&(0x7f00000004c0)='.#\x00', 0x0, 0x0, &(0x7f0000000840)) getgid() timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000340), &(0x7f0000000500)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x1, 0xfffffffffffffffd, 0x2, 0x401}, 0xc) 03:34:17 executing program 2: open$dir(&(0x7f0000000200)='./file0\x00', 0x80440, 0x0) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) truncate(&(0x7f0000000280)='./file0\x00', 0x0) 03:34:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000001800)=""/11, 0xb) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000200)={0x3000, 0x5000}) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, &(0x7f00000004c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0xa3, &(0x7f0000000100)="76b92cb4bdb33b9c7c614aba2ed8", &(0x7f0000000040)=""/163, 0xecc}, 0x28) pkey_alloc(0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x3}, &(0x7f0000000180)=0x14) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffff9c, 0x0) close(r1) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_open(&(0x7f00000004c0)='.#\x00', 0x0, 0x0, &(0x7f0000000840)) getgid() timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000340), &(0x7f0000000500)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x1, 0xfffffffffffffffd, 0x2, 0x401}, 0xc) 03:34:17 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:17 executing program 1: sysfs$2(0x2, 0x1, &(0x7f0000000200)=""/47) gettid() sched_rr_get_interval(0x0, &(0x7f0000000140)) clock_getres(0x0, &(0x7f0000000400)) eventfd(0x0) fchdir(0xffffffffffffffff) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000080)) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:34:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000005a80)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000046c0)=[{0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:34:17 executing program 4: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000140)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000180)) syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:17 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:17 executing program 0: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000340)='ns/cgroup\x00') socket$unix(0x1, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/uinput\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001b40)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000001b80)=0x1c, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000000c0)) pipe2(&(0x7f00000004c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000640)={0x0, &(0x7f0000000280)}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000600)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) gettid() syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0), 0x195) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getresuid(&(0x7f00000002c0), &(0x7f0000000800), &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f0000000500)=0xe8) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) getuid() getuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000740)) getgid() getgroups(0x0, &(0x7f0000000680)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") [ 555.884893] ================================================================== [ 555.892536] BUG: KASAN: use-after-free in mqueue_get_tree+0x2ac/0x2e0 [ 555.899122] Read of size 8 at addr ffff88015c661354 by task syz-executor2/17737 [ 555.906566] [ 555.908226] CPU: 0 PID: 17737 Comm: syz-executor2 Not tainted 4.19.0-rc3-next-20180912+ #72 [ 555.916714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.926068] Call Trace: [ 555.928661] dump_stack+0x1d3/0x2c4 [ 555.932304] ? dump_stack_print_info.cold.2+0x52/0x52 [ 555.937531] ? printk+0xa7/0xcf [ 555.940843] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 555.945647] print_address_description.cold.8+0x9/0x1ff [ 555.951026] kasan_report.cold.9+0x242/0x309 [ 555.955439] ? mqueue_get_tree+0x2ac/0x2e0 [ 555.959688] __asan_report_load8_noabort+0x14/0x20 [ 555.964632] mqueue_get_tree+0x2ac/0x2e0 [ 555.968732] vfs_get_tree+0x1cb/0x5c0 [ 555.972598] mq_create_mount+0xe3/0x190 [ 555.976591] mq_init_ns+0x15a/0x210 [ 555.980232] copy_ipcs+0x3d2/0x580 03:34:17 executing program 0: clock_gettime(0x0, &(0x7f0000000400)) clock_settime(0x0, &(0x7f00000003c0)) semget$private(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000a80)=""/134) seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000b40)=""/4096) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) syz_open_dev$vcsa(&(0x7f00000009c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a00)) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000a40)='/dev/vcsa#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000900)=ANY=[], &(0x7f0000000500)) pipe2(&(0x7f0000000200), 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) pipe(&(0x7f0000000140)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000006c0)}, 0x0) [ 555.983785] ? ipcns_get+0xe0/0xe0 [ 555.987354] ? do_mount+0x1db0/0x1db0 [ 555.991167] ? kmem_cache_alloc+0x33a/0x730 [ 555.995503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.001043] ? perf_event_namespaces+0x136/0x400 [ 556.005860] create_new_namespaces+0x376/0x900 [ 556.010462] ? sys_ni_syscall+0x20/0x20 [ 556.014472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.020048] ? ns_capable_common+0x13f/0x170 [ 556.024496] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 556.029432] ksys_unshare+0x79c/0x10b0 [ 556.033329] ? walk_process_tree+0x440/0x440 [ 556.037740] ? lock_downgrade+0x900/0x900 [ 556.041898] ? kasan_check_read+0x11/0x20 [ 556.046047] ? do_raw_spin_unlock+0xa7/0x2f0 [ 556.050487] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 556.055097] ? kasan_check_write+0x14/0x20 [ 556.059339] ? do_raw_read_unlock+0x3f/0x60 [ 556.063681] ? do_syscall_64+0x9a/0x820 [ 556.067662] ? do_syscall_64+0x9a/0x820 [ 556.071645] ? lockdep_hardirqs_on+0x421/0x5c0 [ 556.076234] ? trace_hardirqs_on+0xbd/0x310 [ 556.080557] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.085935] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 556.091411] ? __ia32_sys_prlimit64+0x8c0/0x8c0 [ 556.096104] __x64_sys_unshare+0x31/0x40 [ 556.100173] do_syscall_64+0x1b9/0x820 [ 556.104061] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 556.109432] ? syscall_return_slowpath+0x5e0/0x5e0 [ 556.114365] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 556.119215] ? trace_hardirqs_on_caller+0x310/0x310 [ 556.124236] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 556.129257] ? prepare_exit_to_usermode+0x291/0x3b0 [ 556.134282] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 556.139136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.144323] RIP: 0033:0x459d87 [ 556.147530] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 556.166441] RSP: 002b:00007ffcf6d23568 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 556.174168] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459d87 [ 556.181436] RDX: 0000000000000000 RSI: 00007ffcf6d23570 RDI: 0000000008000000 [ 556.188703] RBP: 0000000000930b28 R08: 0000000000000000 R09: 0000000000000018 [ 556.195978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 556.203249] R13: 0000000000412cc0 R14: 0000000000000000 R15: 0000000000000000 [ 556.210538] [ 556.212166] Allocated by task 16681: [ 556.215882] save_stack+0x43/0xd0 [ 556.219336] kasan_kmalloc+0xc7/0xe0 [ 556.223068] kasan_slab_alloc+0x12/0x20 [ 556.227049] kmem_cache_alloc+0x12e/0x730 [ 556.231204] copy_net_ns+0x15b/0x4a0 [ 556.234928] create_new_namespaces+0x6ad/0x900 [ 556.239510] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 556.244452] ksys_unshare+0x79c/0x10b0 [ 556.248350] __x64_sys_unshare+0x31/0x40 [ 556.252408] do_syscall_64+0x1b9/0x820 [ 556.256330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.261531] [ 556.263155] Freed by task 16681: [ 556.266520] save_stack+0x43/0xd0 [ 556.269969] __kasan_slab_free+0x102/0x150 [ 556.274202] kasan_slab_free+0xe/0x10 [ 556.278006] kmem_cache_free+0x83/0x290 [ 556.281984] net_drop_ns.part.14+0x129/0x150 [ 556.286422] copy_net_ns+0x39d/0x4a0 [ 556.290133] create_new_namespaces+0x6ad/0x900 [ 556.294755] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 556.299699] ksys_unshare+0x79c/0x10b0 [ 556.303600] __x64_sys_unshare+0x31/0x40 [ 556.307661] do_syscall_64+0x1b9/0x820 [ 556.311544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.316720] [ 556.318345] The buggy address belongs to the object at ffff88015c660040 [ 556.318345] which belongs to the cache net_namespace(49:syz5) of size 8576 [ 556.332047] The buggy address is located 4884 bytes inside of [ 556.332047] 8576-byte region [ffff88015c660040, ffff88015c6621c0) [ 556.344099] The buggy address belongs to the page: [ 556.349026] page:ffffea0005719800 count:1 mapcount:0 mapping:ffff8801c17d3940 index:0x0 compound_mapcount: 0 [ 556.359034] flags: 0x2fffc0000008100(slab|head) [ 556.363716] raw: 02fffc0000008100 ffff8801baf4bc48 ffffea00055e3508 ffff8801c17d3940 [ 556.371635] raw: 0000000000000000 ffff88015c660040 0000000100000001 ffff8801583e2500 [ 556.379524] page dumped because: kasan: bad access detected [ 556.385227] page->mem_cgroup:ffff8801583e2500 [ 556.389713] [ 556.391335] Memory state around the buggy address: [ 556.396267] ffff88015c661200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 556.403635] ffff88015c661280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 556.411101] >ffff88015c661300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 556.418463] ^ [ 556.424430] ffff88015c661380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 556.431785] ffff88015c661400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 556.439148] ================================================================== [ 556.446509] Disabling lock debugging due to kernel taint [ 556.452167] Kernel panic - not syncing: panic_on_warn set ... [ 556.452167] [ 556.459573] CPU: 0 PID: 17737 Comm: syz-executor2 Tainted: G B 4.19.0-rc3-next-20180912+ #72 [ 556.469446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.478827] Call Trace: [ 556.481420] dump_stack+0x1d3/0x2c4 [ 556.485090] ? dump_stack_print_info.cold.2+0x52/0x52 [ 556.490288] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 556.495055] panic+0x238/0x4e7 [ 556.498261] ? add_taint.cold.5+0x16/0x16 [ 556.502423] ? trace_hardirqs_on+0x9a/0x310 [ 556.506761] ? trace_hardirqs_on+0xb4/0x310 [ 556.511099] ? trace_hardirqs_on+0xb4/0x310 [ 556.513072] kobject: 'loop5' (00000000e0fbaf04): kobject_uevent_env [ 556.515444] kasan_end_report+0x47/0x4f [ 556.525838] kasan_report.cold.9+0x76/0x309 [ 556.530166] ? mqueue_get_tree+0x2ac/0x2e0 [ 556.530825] kobject: 'loop5' (00000000e0fbaf04): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 556.534407] __asan_report_load8_noabort+0x14/0x20 [ 556.534422] mqueue_get_tree+0x2ac/0x2e0 [ 556.534439] vfs_get_tree+0x1cb/0x5c0 [ 556.534456] mq_create_mount+0xe3/0x190 [ 556.534474] mq_init_ns+0x15a/0x210 [ 556.565095] copy_ipcs+0x3d2/0x580 [ 556.568661] ? ipcns_get+0xe0/0xe0 [ 556.572212] ? do_mount+0x1db0/0x1db0 [ 556.576015] ? kmem_cache_alloc+0x33a/0x730 [ 556.580379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:34:18 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000006700), 0x0, 0x0, &(0x7f0000006980)) socket$bt_hidp(0x1f, 0x3, 0x6) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000003c0), &(0x7f0000000400)=0x4) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f0000000440)=0x90) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000900), 0x14) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_gettime(0x0, &(0x7f00000069c0)) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000039c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='byz0\x00', 0x200002, 0x0) gettid() ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"}) semget$private(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000940), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600)) [ 556.585932] ? perf_event_namespaces+0x136/0x400 [ 556.590723] create_new_namespaces+0x376/0x900 [ 556.595314] ? sys_ni_syscall+0x20/0x20 [ 556.599316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.604865] ? ns_capable_common+0x13f/0x170 [ 556.609281] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 556.614227] ksys_unshare+0x79c/0x10b0 [ 556.618156] ? walk_process_tree+0x440/0x440 [ 556.622508] kobject: 'loop3' (000000006f77101a): kobject_uevent_env [ 556.622577] ? lock_downgrade+0x900/0x900 [ 556.633125] ? kasan_check_read+0x11/0x20 [ 556.637279] ? do_raw_spin_unlock+0xa7/0x2f0 [ 556.640750] kobject: 'loop3' (000000006f77101a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 556.641690] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 556.641708] ? kasan_check_write+0x14/0x20 [ 556.641720] ? do_raw_read_unlock+0x3f/0x60 [ 556.641734] ? do_syscall_64+0x9a/0x820 [ 556.641759] ? do_syscall_64+0x9a/0x820 [ 556.672224] ? lockdep_hardirqs_on+0x421/0x5c0 [ 556.676840] ? trace_hardirqs_on+0xbd/0x310 [ 556.681172] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.686545] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 556.692016] ? __ia32_sys_prlimit64+0x8c0/0x8c0 [ 556.696699] __x64_sys_unshare+0x31/0x40 [ 556.700768] do_syscall_64+0x1b9/0x820 [ 556.704672] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 556.710040] ? syscall_return_slowpath+0x5e0/0x5e0 [ 556.714987] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 556.719875] ? trace_hardirqs_on_caller+0x310/0x310 [ 556.724895] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 556.729924] ? prepare_exit_to_usermode+0x291/0x3b0 [ 556.734954] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 556.739810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.745012] RIP: 0033:0x459d87 [ 556.748230] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 556.767160] RSP: 002b:00007ffcf6d23568 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 556.774873] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459d87 [ 556.782175] RDX: 0000000000000000 RSI: 00007ffcf6d23570 RDI: 0000000008000000 [ 556.789463] RBP: 0000000000930b28 R08: 0000000000000000 R09: 0000000000000018 [ 556.796735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 556.804026] R13: 0000000000412cc0 R14: 0000000000000000 R15: 0000000000000000 [ 556.812213] Kernel Offset: disabled [ 556.815841] Rebooting in 86400 seconds..